I'll defer to Tero's expertise on this - if he's ok with the revised text, then 
so am I.

Thanks, --David

> -----Original Message-----
> From: Tero Kivinen [mailto:kivi...@iki.fi]
> Sent: Tuesday, September 12, 2017 6:07 PM
> To: Black, David <david.bl...@emc.com>
> Cc: Yoav Nir <ynir.i...@gmail.com>; mcg...@cisco.com;
> andrew.cag...@gmail.com; ipsec@ietf.org; i...@ietf.org; RFC Errata
> System <rfc-edi...@rfc-editor.org>
> Subject: Re: [IPsec] [Technical Errata Reported] RFC5282 (5109)
> 
> Black, David writes:
> > Well, RFC 5282 actually prohibits the responder from selecting that
> > combination, but requiring separate proposals for combined-mode and
> normal
> > ciphers is a cleaner and simpler approach.
> 
> Yes, and RFC5996 restricted that even more, saying that you need to
> use separate proposals to do that, which will make it clear that you
> cannot select such combination and still following the generic IKEv2
> rules how to select algorithms.
> 
> I.e., RFC 5282 changed the generic rules in IKEv2, and when the we did
> do update on the IKEv2, i.e., from RFC4306 -> RFC5996, it decided that
> changing generic rules is bad idea, and we can get the same effect by
> forcing implementations to do two proposals, while also specifying how
> to negotiate the AEAD ciphers for the ESP.
> 
> Note, that using two proposals is completely ok for the RFC5282 point
> of view, i.e., nothing in the RFC5282 forbid using multiple proposals,
> so in sense the RFC5996 did not change RFC5282 text, it just
> restricted some of the options allowed by the RFC5282.
> 
> This was discussed in the IPsec list during the 5996 rewrite, and
> there was ticket #20 assigned for this:
> 
> https://trac.ietf.org/trac/ipsecme/ticket/20
> 
> Of course the RFC5282 only talks when negotiating AEAD algorithm for
> IKEv2 use, not at all when using AEAD algorithm for ESP, i.e., when
> negotiating AEAD algorithm to be used for ESP, which is the much more
> common case. How to negotiate them in ESP was unclear before RFC5996,
> as RFC4106 did not specify anything for IKEv2, and RFC4306 did not
> really specify how they are negotiated.
> 
> > It looks like RFC 7296 should have updated RFC 5282, but didn’t. I
> > need to look at the relevant text in both RFCs more carefully, and
> > plan to respond to Andrew’s email later today with my 0.02 on what
> > should be done.
> 
> I am not sure if RFC5996 should have updated RFC5282, as it only
> restricted some of the options allowed by RFC5282, but what is
> specified in the RFC5996 is still completely inside the what RFC5282
> implementation will accept.
> 
> RFC5996 did restrict some options from the RFC4306 also, i.e., things
> that were allowed in RFC4306, were no longer allowed in RFC5996.
> 
> If someone would have pointed that out during the RFC5996 cycle, we
> would most likely had done something to it...
> 
> >     On 12 Sep 2017, at 1:19, Black, David <david.bl...@dell.com> wrote:
> >
> >     [Adding the IPsec mailing list.]
> >
> >         Notes
> >         -----
> >         RFC-7296 and RFC-5282 contradict each other (yet RFC-7296 cites
> >         RFC-5282 without any clarification):
> 
> They do not really contradict, the RFC5996 and RFC7296 restrict the
> options which were allowed in the RFC5282, but RFC5996 initiator will
> still talk to the RFC5282 responder. If RFC5282 initiator tries to
> talk to the RFC5996 responder, and does not use multiple proposals,
> then the RFC5996 specification is silent what to do for that. Some
> implementations will most likely accept it, and some will return
> error.
> 
> >         - RFC-7296 explicitly disallows mixing AEAD and non-AEAD
> >         algorithms in a single proposal; RFC-5282 does not (and
> >         strongly implies it is allowed)
> 
> RFC582 might imply so, but does not require or even suggest such
> behavior, and using two proposals solves the issue in a way which is
> acceptable for the RFC5282 too.
> 
> Btw, note, that RFC5996 and 7296 does not use upper case MUST, it just
> states the facts, i.e. "two proposals are needed" (section 2.7), and
> that if proposing both AEAD and non-AEAD ciphers, then "it must
> include two proposals".
> 
> I.e. those are not new requirements, they are just facts based on the
> requirements derived from the requirements elsewhere in the
> specification.
> 
> >         - RFC-7296 allows 'none' integrity in an AEAD-only proposal; 
> > RFC-5282
> >         does not.
> 
> Yes. We had discussion about this when RFC5996 was being made, and I
> think the reason why we do allow it was that there were some
> implementations doing that (for ESP), and we did not want to make them
> non-compilent by saying MUST NOT. Note, that RFC5996/7296 text covers
> both cases when negotiating the AEAD for IKEv2 and ESP. The RFC5282
> case only really covers IKEv2 case.
> 
> >         Corrected Text
> >         --------------
> >         8.  IKEv2 Algorithm Selection
> >
> >         IKEv2 [rfc7296], section 3.3. Security Association Payload, 
> > specifies
> >         AEAD algorithm selection.
> 
> This corrected text is good, and I think we can safely mark this as
> errata ok, as the text specifying how to negotiate the AEAD ciphers
> has in fact been incorporated in to the base IKEv2 specification.
> --
> kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to