> -----Original Message-----
> From: Paul Wouters [mailto:p...@nohats.ca]
> Sent: Tuesday, March 06, 2018 5:53 PM
> To: Hu, Jun (Nokia - US/Mountain View) <jun...@nokia.com>
> Cc: ipsec@ietf.org WG <ipsec@ietf.org>; Sahana Prasad
> <sahana.prasa...@gmail.com>
> Subject: RE: [IPsec] Fwd: New Version Notification for draft-sprasad-ipsecme-
> labeled-ipsec-00.txt (fwd)
> 
> On Tue, 6 Mar 2018, Hu, Jun (Nokia - US/Mountain View) wrote:
> 
> > Some initial questions/comments:
> > 1. security label is defined as opaque data in the draft, but then how
> > would narrowing work in an inter-op way with opaque data? Or should we
> > define the format for some common use cases (like security
> > enforcement, QoS ...) , and adding a sub-type in TS_SECLABEL
> 
> The idea was that people should be able to define this outside of IKE as they
> wish. And IKE just transports the label as-is. Of course, if IKE can 
> interpret it to
> do something, then it can possibly do more, like narrowing.
> 
> I think usually the two endpoints will only have one type of SECLABEL, so the
> type is implicit to the IKE protocol. If you have different subtypes, then
> presumably if the subtype is wrong, you can't accept it, so the type is 
> already
> known on both ends and doesn't need to have its own registry?
> 
[HJ] sound like you want to treat this as vendor specific, I am fine if for 
certain use case you don't want to include interpretation of SECLABLE in the 
draft;
But for certain common use case, like Qos (or service class), if we want 
implementation from different vendor to inter-op, we should define a clear 
format for it; either in this draft, or we could have separate draft to define 
use case ,format and narrowing rule;
That's why I think we could have a sub-type here, leave one value for vendor 
specific, but define some other sub-types for common use cases


> > 2. currently there are TSi (44) and TSr (45) payload, does it make sense to
> include TS_SECLABEL in either TSi or TSr? Is there semantic to have separate
> "initiator SECLABEL" and "responder SECLABEL"? Or does it make more sense
> to only allow single TS_SECLABEL per message/CHILD_SA, and create a new
> TS payload type , put TS_SECLABEL in it ?
> 
> That would be giving it another Payload Type. I think it is really a traffic
> selector type payload, and not a non-traffic-selector payload.
> 
> Even if it is true that the label on both ends have to always match.
> But that's kind of similar to address family always needing to match.
> 
> Although there might be a case where one end is allowed to send traffic with
> SECLABEL Foo, but not allowed to receive traffic with that label, where TSi
> could contain a TS_SECLABEL entry, and TSr would not.
> 
> Another case that probably needs some attention is when there is more then
> one TS_SECLABEL. Does it mean two different types of security labels are
> meant, and both have to match? Or is it okay to pick any one of the labels?
> 
[HJ] again, I think this depends on the use case of SECLABEL, in case of 
service class, single SECLABEL make sense, but for other cases, maybe two 
different label make sense 
> Paul
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to