Hi Ben, 

Please see inline...

> -----Original Message-----
> From: Ben Campbell [mailto:b...@nostrum.com]
> Sent: 03 August 2017 20:57
> To: Dhruv Dhody <dhruv.dh...@huawei.com>
> Cc: The IESG <i...@ietf.org>; cmarga...@juniper.net; draft-ietf-pce-
> pc...@ietf.org; pce@ietf.org; pce-cha...@ietf.org
> Subject: Re: [Pce] Ben Campbell's Discuss on draft-ietf-pce-pceps-15:
> (with DISCUSS and COMMENT)

 (snip)

> >>
> >> ---------------------------------------------------------------------
> >> -
> >> COMMENT:
> >> ---------------------------------------------------------------------
> >> -
> >>
> >> Substantive:
> >>
> >> - I share Warren's question about why you chose STARTTLS over a
> >> dedicated port, especially since the 2nd to last paragraph in 3.2
> >> goes out of its way to mention that. What were the tradeoffs involved
> >> that made adding the additional protocol machinery more attractive
> >> than allocating a port number?
> >>
> > [[Dhruv Dhody]] I have added this text -
> >
> >   This document uses the standard StartTLS procedure in PCEP, instead
> >   of using a different port for the secured session.  This is done to
> >   avoid requesting allocation of another port number for the PCEPS.
> >   The StartTLS procedure makes more efficient use of scarce port
> >   numbers and allow simpler configuration of PCEP.
> 
> That’s helpful, but it only shows the benefits side of the tradeoff. I
> assume people thought the additional protocol complexity was a reasonable
> cost to bear?
> 
[[Dhruv Dhody]] There was substantive discussion on the mailing list regarding 
this, as our original proposal requested a new port and we were advised to use 
StartTLS instead after discussion with transport/security folks. See 
https://www.ietf.org/mail-archive/web/pce/current/msg03540.html. 


> 
> >
> >> - 3.2: "Implementations MUST support SHA-256 as defined by [SHS] as
> >>          the hash algorithm for the fingerprint."
> >> Do you really intend "MUST support" (meaning you have to be able to
> >> handle sha-256, but could allow other hashes) vs "MUST use"?
> >>
> > [[Dhruv Dhody]] Yes, additional hash algorithm MAY also be
> supported/used.
> >
> 
> Is there an expectation people will use multiple hash algorithms side-by-
> side? Or is this for purposes of hash agility?
> 
[[Dhruv Dhody]] SHA-256 is the current mandatory hash, others might become 
usable and useful as the technology evolves. Do you have any suggested change 
in mind? 
I see RFC6614 use similar language "Implementations MUST support SHA-1 as the 
hash algorithm for the fingerprint...."

(snip)

> >> - 3.4 : "Negotiation of mutual authentication is REQUIRED."
> >> Does that mean that the peers must elect to use mutual
> >> authentication, or that if they want to use it, they must agree to do
> >> so? (The pattern persists throughout the section, but the meaning
> >> seems more obvious for some of the
> >> others.)
> >>
> > [[Dhruv Dhody]] I am also not sure, this was added keeping RFC6614 as
> our reference.
> > Since TLS supports multiple authentication mode, this might be a say
> > mutual as well as server-only authentication should be supported. But
> > not sure about the word negotiation here. I think we can remove this
> > statement, will do so once you confirm. he
> 
> The important thing is that the intent of the WG is clear. Do you mean to
> say that the working group intended to allow both server-only and mutual
> authentication, or do you mean to say the working group did not think
> about it?
> 
[[Dhruv Dhody]] On further discussion with my co-authors, we feel we should 
remove the statement. The previous statement in the draft about mutual 
authentication is enough and mutual authentication should be the standard. 

Regards,
Dhruv

> […]
> Thanks!
> 
> Ben.
_______________________________________________
Pce mailing list
Pce@ietf.org
https://www.ietf.org/mailman/listinfo/pce

Reply via email to