RE: Followup on Gen-ART review of draft-ietf-mext-binding-revocation (was Re: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10)

2009-10-05 Thread Ahmad Muhanna

Thank you Ben for reviewing and taking the time to go through the
document once more!
Agreed; Sorry, I missed that one.

I will make sure it is included in the next revision. I am sure you are
okay not to spin another revision unless this is the only outstanding
comment.

Thanks again!

Regards,
Ahmad
 

 -Original Message-
 From: Ben Campbell [mailto:b...@nostrum.com] 
 Sent: Friday, October 02, 2009 2:47 PM
 To: Muhanna, Ahmad (RICH1:2H10)
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 kchowdh...@starentnetworks.com; pyeg...@juniper.net; General 
 Area Review Team; IETF-Discussion list; Jari Arkko; 
 marc...@it.uc3m.es; Julien Laganier
 Subject: Followup on Gen-ART review of 
 draft-ietf-mext-binding-revocation (was Re: Gen-ART LC and 
 Telechat Review of draft-ietf-mext-binding-revocation-10)
 
 Hi,
 
 This is a followup of my Gen-ART review of 
 draft-ietf-mext-binding- revocation, updated based on 
 revision 13 of that draft.
 
 This revision addresses all of my substantive issues, and 
 most of the editorial issues. I had one outstanding minor 
 editorial comment where the author proposed a specific 
 change, but that change did not make it into revision 13 as 
 far as I can tell:
 
 
  -- Section 11, (InitMINDelayBRIs) (I think I commented on 
 this, but 
  can't find the resolution)
 
  Did you intend for the _default_ to be a range (between .5 and 1 
  sec), or did you mean to say the default was 1 second, and it must 
  not be configured to less than .5 seconds? I suspect the 
 latter, but 
  it's not clear from the text.
 
  [Ahmad]
  Sure, will fix this as follows:
 
Initial Minimum Delay Between BRI messages (InitMINDelayBRIs)
 
   This variable specifies the initial delay timeout in seconds
   before the revoking mobility entity retransmits a BRI message.
   The default is 1 second but not to be configured less than 0.5 
  seconds.
 
 Revision 13 still appears to have the old text.
 
 
 Thanks!
 
 Ben.
 
 
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [DISCUSS + Gen-ART] Review of draft-ietf-mext-binding-revocation-10

2009-09-30 Thread Ahmad Muhanna

Hello All,

We have submitted a new revision (13) of the Binding Revocation draft
which addresses all comments including Ben and Ralph outstanding ones.
In summary, we did the following:

1. After some discussion, we removed the Acknowledge (A) bit but
maintained the same logic.
2. We also simplified the structure of the document to eliminate
duplication and moved all common text under The Initiator and Responder
sections.
3. For simplification, added new terminology: Initiator and Responder.
4. Defined a new Error Code Proxy Binding Revocation NOT Supported to
allow the mobile node to reject a BRI with the (P) bit is set.

Please take a look and let us know if you still have any comments or you
are satisfied with the way your comments have been addressed.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-mext-binding-revocation-1
3.txt

Many thanks in advance!


Regards,
Ahmad
 

 -Original Message-
 From: Muhanna, Ahmad (RICH1:2H10) 
 Sent: Wednesday, September 16, 2009 5:34 PM
 To: 'Ben Campbell'
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; 
 Jari Arkko; marc...@it.uc3m.es; Laganier, Julien
 Subject: RE: Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi Ben,
 
 Not at all. 
 I just thought that would work better for you. But, I am okay 
 with keeping the text and adding the note.
 
 Regards,
 Ahmad
  
 
  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Sent: Wednesday, September 16, 2009 5:32 PM
  To: Muhanna, Ahmad (RICH1:2H10)
  Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
  pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; Jari 
  Arkko; marc...@it.uc3m.es; Laganier, Julien
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
  
  Hi Ahmad,
  
  I guess that's okay since the removed text talks about 
 behavior under 
  an error condition anyway, so I won't object further if you 
 do it this 
  way. But I actually prefer the old text with the warning about 
  retransmissions. My concern is, the proposal below simply 
 leaves the 
  case of A being set but having no matching binding 
 undefined. I think 
  that makes implementors even more likely to decide not to 
 send a BRA 
  in that case.
  
Is the warning about retransmissions causing concern?
  
  On Sep 16, 2009, at 5:19 PM, Ahmad Muhanna wrote:
  
   Hello Ben,
  
   Thinking about this a little more, I think that you also
  would accept
   if we remove the text causing grief all together:) In 
 other words, 
   what about if we reword the text as below:
  
   OLD TEXT:
   =
 o  If the Acknowledge (A) bit is set in the Binding Revocation
Indication and its Binding Update List contains an
  entry for the
IP address in the Type 2 routing header, the mobile 
 node MUST 
   send
a Binding Revocation Acknowledgement.  However, in all other 
   cases
when the Acknowledge (A) bit is set in the BRI, the 
 mobile node
SHOULD sends a Binding Revocation Acknowledgement, 
 the mobile 
   node
MUST do so according to Section 10.2.
  
   NEW TEXT:
   =
  
 o  If the Acknowledge (A) bit is set in the Binding Revocation
Indication and its Binding Update List contains an
  entry for the
IP address in the Type 2 routing header, the mobile 
 node MUST 
   send
a Binding Revocation Acknowledgement.
  
  
   This way we do not need to add the clarification note.
  
   What do you think?
  
   Please let me know and many thanks again!
  
   Regards,
   Ahmad
  
  
   -Original Message-
   From: Muhanna, Ahmad (RICH1:2H10)
   Sent: Monday, September 14, 2009 2:06 PM
   To: 'Ben Campbell'
   Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
   pyeg...@juniper.net; General Area Review Team; 
 ietf@ietf.org; Jari 
   Arkko; marc...@it.uc3m.es; Laganier, Julien
   Subject: RE: Gen-ART LC and Telechat Review of 
   draft-ietf-mext-binding-revocation-10
  
   Hi Ben,
  
   I am fine with your proposed text.
   Many thanks for your review and comments.
  
   Regards,
   Ahmad
  
  
   -Original Message-
   From: Ben Campbell [mailto:b...@estacado.net]
   Sent: Monday, September 14, 2009 2:02 PM
   To: Muhanna, Ahmad (RICH1:2H10)
   Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
   pyeg...@juniper.net; General Area Review Team;
  ietf@ietf.org; Jari
   Arkko; marc...@it.uc3m.es; Laganier, Julien
   Subject: Re: Gen-ART LC and Telechat Review of 
   draft-ietf-mext-binding-revocation-10
  
   Hi Ahmad,
  
   Please see inline for my suggested text for the
   retransmission issue.
   Otherwise, I agree this closes the open issues.
  
   Thanks!
  
   Ben.
  
   On Sep 12, 2009, at 3:23 AM, Ahmad Muhanna wrote:
  
   Hi Ben,
   Hopefully we can close on all of the open issues.
   Please see inline.
  
   Regards,
   Ahmad

RE: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-17 Thread Ahmad Muhanna
Hello Ben,

Thinking about this a little more, I think that you also would accept if
we remove the text causing grief all together:) In other words, what
about if we reword the text as below:

OLD TEXT:
=
   o  If the Acknowledge (A) bit is set in the Binding Revocation
  Indication and its Binding Update List contains an entry for the
  IP address in the Type 2 routing header, the mobile node MUST send
  a Binding Revocation Acknowledgement.  However, in all other cases
  when the Acknowledge (A) bit is set in the BRI, the mobile node
  SHOULD sends a Binding Revocation Acknowledgement, the mobile node
  MUST do so according to Section 10.2.

NEW TEXT:
=

   o  If the Acknowledge (A) bit is set in the Binding Revocation
  Indication and its Binding Update List contains an entry for the
  IP address in the Type 2 routing header, the mobile node MUST send
  a Binding Revocation Acknowledgement.


This way we do not need to add the clarification note.

What do you think? 

Please let me know and many thanks again!

Regards,
Ahmad
 

 -Original Message-
 From: Muhanna, Ahmad (RICH1:2H10) 
 Sent: Monday, September 14, 2009 2:06 PM
 To: 'Ben Campbell'
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; 
 Jari Arkko; marc...@it.uc3m.es; Laganier, Julien
 Subject: RE: Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi Ben,
 
 I am fine with your proposed text.
 Many thanks for your review and comments.
 
 Regards,
 Ahmad
  
 
  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Sent: Monday, September 14, 2009 2:02 PM
  To: Muhanna, Ahmad (RICH1:2H10)
  Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
  pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; Jari 
  Arkko; marc...@it.uc3m.es; Laganier, Julien
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
  
  Hi Ahmad,
  
  Please see inline for my suggested text for the 
 retransmission issue.
  Otherwise, I agree this closes the open issues.
  
  Thanks!
  
  Ben.
  
  On Sep 12, 2009, at 3:23 AM, Ahmad Muhanna wrote:
  
   Hi Ben,
   Hopefully we can close on all of the open issues.
   Please see inline.
  
   Regards,
   Ahmad
  
   -Original Message-
   From: Ben Campbell [mailto:b...@estacado.net]
   Subject: Re: Gen-ART LC and Telechat Review of 
   draft-ietf-mext-binding-revocation-10
  
   This is a followup on revision 12, since it came out
   before I got to
   revision 11:
  
   Overall, I think this revision is much better. Most of
  my concerns
   have been addressed, but I have a few minor ones remaining.
  
   Specific comments:
  
  
   -- Section 10.1, 2nd bullet:
  
   I don't think we resolved my concern about the SHOULD
  in the last
   sentence. To recap, I think that needs to either be a
  MUST, or the
   draft should offer guidance about the reasoning for the
  SHOULD and
   the consequences of not following it. I'm picking on 
 this one in 
   particular because it seems like not sending a BRA when
   the A bit was
   set is likely to cause retransmissions on the part of the
   initiator.
  
   [Ahmad]
   If the MN does NOT have a binding in its BUL for the HoA
   address that
   is included in the Type 2 Routing header, the mobile node
   should not
   respond back (that was specifically discussed in details
  on the wg
   ml).
   It is like instructing the MN to delete a session that does
   not exist.
   Although, the (A) bit is set, it is up to the mobile node
   whether to
   send a BRA or not. I do not believe we need to mandate 
 that via a 
   MUST.
   I am sure some handset vendors will not like that at all.
  
   Did the work group consider that if a MN doesn't respond, it can 
   expect to get a bunch of retransmissions--each of which it
  will need
   to parse, check for bindings, etc.; possibly eating more 
 resources 
   than responding in the first place would have?
  
   I could understand if the concern was that the MN might get 
   irrelevant (or even malicious) BRIs from arbitrary
  sources, but since
   they should only be arriving from trusted peers over
  established SAs,
   I find the choice surprising.
  
   But in any case, my concern was that it should be a MUST _or_ it 
   should have discussion of the consequences of not doing
  it. A line or
   two mentioning why this is a should, under what circumstances it 
   makes sense to not respond, and most importantly 
 pointing out the 
   potential for needless retransmission would help.
  
   [Ahmad]
   Yes we discussed that, but there are cases when the MN is
  not able to
   send a BRA, for example, losing coverage, etc. SHOULD 
  still a very
   strong requirement, the node MUST do it unless there is a 
 very good 
   valid reason not to.
  
   But, please see below.
  
  
  
  
  
   Also, the last sentence does

RE: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-17 Thread Ahmad Muhanna
Hi Ben,

Not at all. 
I just thought that would work better for you. But, I am okay with
keeping the text and adding the note.

Regards,
Ahmad
 

 -Original Message-
 From: Ben Campbell [mailto:b...@estacado.net] 
 Sent: Wednesday, September 16, 2009 5:32 PM
 To: Muhanna, Ahmad (RICH1:2H10)
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; 
 Jari Arkko; marc...@it.uc3m.es; Laganier, Julien
 Subject: Re: Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi Ahmad,
 
 I guess that's okay since the removed text talks about 
 behavior under an error condition anyway, so I won't object 
 further if you do it this way. But I actually prefer the old 
 text with the warning about retransmissions. My concern is, 
 the proposal below simply leaves the case of A being set but 
 having no matching binding undefined. I think that makes 
 implementors even more likely to decide not to send a BRA in 
 that case.
 
   Is the warning about retransmissions causing concern?
 
 On Sep 16, 2009, at 5:19 PM, Ahmad Muhanna wrote:
 
  Hello Ben,
 
  Thinking about this a little more, I think that you also 
 would accept 
  if we remove the text causing grief all together:) In other words, 
  what about if we reword the text as below:
 
  OLD TEXT:
  =
o  If the Acknowledge (A) bit is set in the Binding Revocation
   Indication and its Binding Update List contains an 
 entry for the
   IP address in the Type 2 routing header, the mobile node MUST 
  send
   a Binding Revocation Acknowledgement.  However, in all other 
  cases
   when the Acknowledge (A) bit is set in the BRI, the mobile node
   SHOULD sends a Binding Revocation Acknowledgement, the mobile 
  node
   MUST do so according to Section 10.2.
 
  NEW TEXT:
  =
 
o  If the Acknowledge (A) bit is set in the Binding Revocation
   Indication and its Binding Update List contains an 
 entry for the
   IP address in the Type 2 routing header, the mobile node MUST 
  send
   a Binding Revocation Acknowledgement.
 
 
  This way we do not need to add the clarification note.
 
  What do you think?
 
  Please let me know and many thanks again!
 
  Regards,
  Ahmad
 
 
  -Original Message-
  From: Muhanna, Ahmad (RICH1:2H10)
  Sent: Monday, September 14, 2009 2:06 PM
  To: 'Ben Campbell'
  Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
  pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; Jari 
  Arkko; marc...@it.uc3m.es; Laganier, Julien
  Subject: RE: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
 
  Hi Ben,
 
  I am fine with your proposed text.
  Many thanks for your review and comments.
 
  Regards,
  Ahmad
 
 
  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Sent: Monday, September 14, 2009 2:02 PM
  To: Muhanna, Ahmad (RICH1:2H10)
  Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
  pyeg...@juniper.net; General Area Review Team; 
 ietf@ietf.org; Jari 
  Arkko; marc...@it.uc3m.es; Laganier, Julien
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
 
  Hi Ahmad,
 
  Please see inline for my suggested text for the
  retransmission issue.
  Otherwise, I agree this closes the open issues.
 
  Thanks!
 
  Ben.
 
  On Sep 12, 2009, at 3:23 AM, Ahmad Muhanna wrote:
 
  Hi Ben,
  Hopefully we can close on all of the open issues.
  Please see inline.
 
  Regards,
  Ahmad
 
  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
 
  This is a followup on revision 12, since it came out
  before I got to
  revision 11:
 
  Overall, I think this revision is much better. Most of
  my concerns
  have been addressed, but I have a few minor ones remaining.
 
  Specific comments:
 
 
  -- Section 10.1, 2nd bullet:
 
  I don't think we resolved my concern about the SHOULD
  in the last
  sentence. To recap, I think that needs to either be a
  MUST, or the
  draft should offer guidance about the reasoning for the
  SHOULD and
  the consequences of not following it. I'm picking on
  this one in
  particular because it seems like not sending a BRA when
  the A bit was
  set is likely to cause retransmissions on the part of the
  initiator.
 
  [Ahmad]
  If the MN does NOT have a binding in its BUL for the HoA
  address that
  is included in the Type 2 Routing header, the mobile node
  should not
  respond back (that was specifically discussed in details
  on the wg
  ml).
  It is like instructing the MN to delete a session that does
  not exist.
  Although, the (A) bit is set, it is up to the mobile node
  whether to
  send a BRA or not. I do not believe we need to mandate
  that via a
  MUST.
  I am sure some handset vendors will not like that at all.
 
  Did the work group consider that if a MN

RE: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-15 Thread Ahmad Muhanna
Hi Ben,

I am fine with your proposed text.
Many thanks for your review and comments.

Regards,
Ahmad
 

 -Original Message-
 From: Ben Campbell [mailto:b...@estacado.net] 
 Sent: Monday, September 14, 2009 2:02 PM
 To: Muhanna, Ahmad (RICH1:2H10)
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 pyeg...@juniper.net; General Area Review Team; ietf@ietf.org; 
 Jari Arkko; marc...@it.uc3m.es; Laganier, Julien
 Subject: Re: Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi Ahmad,
 
 Please see inline for my suggested text for the 
 retransmission issue.  
 Otherwise, I agree this closes the open issues.
 
 Thanks!
 
 Ben.
 
 On Sep 12, 2009, at 3:23 AM, Ahmad Muhanna wrote:
 
  Hi Ben,
  Hopefully we can close on all of the open issues.
  Please see inline.
 
  Regards,
  Ahmad
 
  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
 
  This is a followup on revision 12, since it came out
  before I got to
  revision 11:
 
  Overall, I think this revision is much better. Most of 
 my concerns 
  have been addressed, but I have a few minor ones remaining.
 
  Specific comments:
 
 
  -- Section 10.1, 2nd bullet:
 
  I don't think we resolved my concern about the SHOULD  
 in the last 
  sentence. To recap, I think that needs to either be a 
 MUST, or the 
  draft should offer guidance about the reasoning for the 
 SHOULD and 
  the consequences of not following it. I'm picking on this one in 
  particular because it seems like not sending a BRA when
  the A bit was
  set is likely to cause retransmissions on the part of the
  initiator.
 
  [Ahmad]
  If the MN does NOT have a binding in its BUL for the HoA
  address that
  is included in the Type 2 Routing header, the mobile node
  should not
  respond back (that was specifically discussed in details 
 on the wg 
  ml).
  It is like instructing the MN to delete a session that does
  not exist.
  Although, the (A) bit is set, it is up to the mobile node
  whether to
  send a BRA or not. I do not believe we need to mandate that via a 
  MUST.
  I am sure some handset vendors will not like that at all.
 
  Did the work group consider that if a MN doesn't respond, it can 
  expect to get a bunch of retransmissions--each of which it 
 will need 
  to parse, check for bindings, etc.; possibly eating more resources 
  than responding in the first place would have?
 
  I could understand if the concern was that the MN might get 
  irrelevant (or even malicious) BRIs from arbitrary 
 sources, but since 
  they should only be arriving from trusted peers over 
 established SAs, 
  I find the choice surprising.
 
  But in any case, my concern was that it should be a MUST _or_ it 
  should have discussion of the consequences of not doing 
 it. A line or 
  two mentioning why this is a should, under what circumstances it 
  makes sense to not respond, and most importantly pointing out the 
  potential for needless retransmission would help.
 
  [Ahmad]
  Yes we discussed that, but there are cases when the MN is 
 not able to 
  send a BRA, for example, losing coverage, etc. SHOULD 
 still a very 
  strong requirement, the node MUST do it unless there is a very good 
  valid reason not to.
 
  But, please see below.
 
 
 
 
 
  Also, the last sentence does not seem to make grammatical
  sense after
  the edits.
 
  Thx, here is the new text, please let me know if you are
  okay with it.
 
   o  If the Acknowledge (A) bit is set in the Binding Revocation
  Indication and its Binding Update List contains an
  entry for the
  IP address in the Type 2 routing header, the mobile node MUST 
  send
  a Binding Revocation Acknowledgement.  However, in all other 
  cases
  when the Acknowledge (A) bit is set in the BRI, the 
 mobile node
  SHOULD sends a Binding Revocation Acknowledgement following 
  Section 10.2.
 
  That's better, depending on the resolution of the SHOULD 
 discussion 
  above.
 
  [Ahmad]
  Here is the text with the proposed addition as suggested above:
 
o  If the Acknowledge (A) bit is set in the Binding Revocation
   Indication and its Binding Update List contains an 
 entry for the
   IP address in the Type 2 routing header, the mobile node MUST 
  send
   a Binding Revocation Acknowledgement.  However, in all other 
  cases
   when the Acknowledge (A) bit is set in the BRI, the mobile node
   SHOULD sends a Binding Revocation Acknowledgement following 
  Section
   10.2. In the case when the MN does not send a BRA message in 
  response
   to a BRI with the Acknowledge (A) bit is set, the MN 
 may receive 
  a
 
   retransmit of the BRI message.
 
  Is that acceptable?
 
 
 Mostly. I would say one or more retransmissions, as they 
 are likely to get several. Also, keep in mind this causes 
 additional work for the initiator, who would have

RE: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-14 Thread Ahmad Muhanna
Hi Ben,
Hopefully we can close on all of the open issues.
Please see inline.

Regards,
Ahmad

  -Original Message-
  From: Ben Campbell [mailto:b...@estacado.net]
  Subject: Re: Gen-ART LC and Telechat Review of 
  draft-ietf-mext-binding-revocation-10
 
  This is a followup on revision 12, since it came out 
 before I got to 
  revision 11:
 
  Overall, I think this revision is much better. Most of my concerns 
  have been addressed, but I have a few minor ones remaining.
 
  Specific comments:
 
 
  -- Section 10.1, 2nd bullet:
 
  I don't think we resolved my concern about the SHOULD  in the last 
  sentence. To recap, I think that needs to either be a MUST, or the 
  draft should offer guidance about the reasoning for the SHOULD and 
  the consequences of not following it. I'm picking on this one in 
  particular because it seems like not sending a BRA when 
 the A bit was 
  set is likely to cause retransmissions on the part of the 
 initiator.
 
  [Ahmad]
  If the MN does NOT have a binding in its BUL for the HoA 
 address that 
  is included in the Type 2 Routing header, the mobile node 
 should not 
  respond back (that was specifically discussed in details on the wg 
  ml).
  It is like instructing the MN to delete a session that does 
 not exist.
  Although, the (A) bit is set, it is up to the mobile node 
 whether to 
  send a BRA or not. I do not believe we need to mandate that via a 
  MUST.
  I am sure some handset vendors will not like that at all.
 
 Did the work group consider that if a MN doesn't respond, it 
 can expect to get a bunch of retransmissions--each of which 
 it will need to parse, check for bindings, etc.; possibly  
 eating more resources than responding in the first place would have?
 
 I could understand if the concern was that the MN might get 
 irrelevant (or even malicious) BRIs from arbitrary sources, 
 but since they should only be arriving from trusted peers 
 over established SAs, I find the choice surprising.
 
 But in any case, my concern was that it should be a MUST _or_ 
 it should have discussion of the consequences of not doing 
 it. A line or two mentioning why this is a should, under what 
 circumstances it makes sense to not respond, and most 
 importantly pointing out the potential for needless 
 retransmission would help.

[Ahmad]
Yes we discussed that, but there are cases when the MN is not able to
send a BRA, for example, losing coverage, etc. SHOULD still a very
strong requirement, the node MUST do it unless there is a very good
valid reason not to.

But, please see below. 

 
 
 
 
  Also, the last sentence does not seem to make grammatical 
 sense after 
  the edits.
 
  Thx, here is the new text, please let me know if you are 
 okay with it.
 
o  If the Acknowledge (A) bit is set in the Binding Revocation
   Indication and its Binding Update List contains an 
 entry for the
   IP address in the Type 2 routing header, the mobile node MUST 
  send
   a Binding Revocation Acknowledgement.  However, in all other 
  cases
   when the Acknowledge (A) bit is set in the BRI, the mobile node
   SHOULD sends a Binding Revocation Acknowledgement following 
  Section 10.2.
 
 That's better, depending on the resolution of the SHOULD 
 discussion above.

[Ahmad] 
Here is the text with the proposed addition as suggested above:

   o  If the Acknowledge (A) bit is set in the Binding Revocation
  Indication and its Binding Update List contains an entry for the
  IP address in the Type 2 routing header, the mobile node MUST send
  a Binding Revocation Acknowledgement.  However, in all other cases
  when the Acknowledge (A) bit is set in the BRI, the mobile node
  SHOULD sends a Binding Revocation Acknowledgement following
Section
  10.2. In the case when the MN does not send a BRA message in
response 
  to a BRI with the Acknowledge (A) bit is set, the MN may receive a

  retransmit of the BRI message.

Is that acceptable?

 
 
 
  -- Same section, 4th bullet:
 
  This one  still seems to ignore the A bit value. Given the
  other edits, am I correct in assuming that you expect a BRA
  if the A bit was set, otherwise a silent discard?
 
  [Ahmad]
  I believe we discussed this a little before. It is a fatal 
 error and  
  the
  MN should never receive a BRI with the (P) bit set. That why this
  behavior is the same regardless of the (A) bit is set or not. If you
  feel that some clarification about the (A) bit needs to be 
 added, I  
  can
  say,
  .. regardless if the Acknowledge (A) bit is set or not, 
 the mobile
  node MUST silently discard the BRI message.
 
  From previous discussion, I thought we had converged on the 
 idea that  
 the A-bit should always be authoritative, rather than having 
 the A-bit  
 treatment change due to context. Again, my concern is that 
 the sender  
 is likely to retransmit multiple times if you don't respond.
[Ahmad]
Yes, the (A) bit is authoritative when it is 

RE: Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-11 Thread Ahmad Muhanna
Hi Ben,
Thanks for the follow up. Please see answers inline.

Regards,
Ahmad
 

 -Original Message-
 From: Ben Campbell [mailto:b...@estacado.net] 
 Subject: Re: Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 This is a followup on revision 12, since it came out before I 
 got to revision 11:
 
 Overall, I think this revision is much better. Most of my 
 concerns have been addressed, but I have a few minor ones remaining.
 
 Specific comments:
 
 
 -- Section 10.1, 2nd bullet:
 
 I don't think we resolved my concern about the SHOULD  in the 
 last sentence. To recap, I think that needs to either be a 
 MUST, or the draft should offer guidance about the reasoning 
 for the SHOULD and the consequences of not following it. I'm 
 picking on this one in particular because it seems like not 
 sending a BRA when the A bit was set is likely to cause 
 retransmissions on the part of the initiator.

[Ahmad]
If the MN does NOT have a binding in its BUL for the HoA address that is
included in the Type 2 Routing header, the mobile node should not
respond back (that was specifically discussed in details on the wg ml).
It is like instructing the MN to delete a session that does not exist.
Although, the (A) bit is set, it is up to the mobile node whether to
send a BRA or not. I do not believe we need to mandate that via a MUST.
I am sure some handset vendors will not like that at all.

 
 Also, the last sentence does not seem to make grammatical 
 sense after the edits.

Thx, here is the new text, please let me know if you are okay with it.

   o  If the Acknowledge (A) bit is set in the Binding Revocation
  Indication and its Binding Update List contains an entry for the
  IP address in the Type 2 routing header, the mobile node MUST send
  a Binding Revocation Acknowledgement.  However, in all other cases
  when the Acknowledge (A) bit is set in the BRI, the mobile node
  SHOULD sends a Binding Revocation Acknowledgement following
Section 10.2.

 
 -- Same section, 4th bullet:
 
 This one  still seems to ignore the A bit value. Given the 
 other edits, am I correct in assuming that you expect a BRA 
 if the A bit was set, otherwise a silent discard?

[Ahmad]
I believe we discussed this a little before. It is a fatal error and the
MN should never receive a BRI with the (P) bit set. That why this
behavior is the same regardless of the (A) bit is set or not. If you
feel that some clarification about the (A) bit needs to be added, I can
say,
.. regardless if the Acknowledge (A) bit is set or not, the mobile
node MUST silently discard the BRI message.

 
 -- Section 11, (InitMINDelayBRIs) (I think I commented on 
 this, but can't find the resolution)
 
 Did you intend for the _default_ to be a range (between .5 
 and 1 sec), or did you mean to say the default was 1 second, 
 and it must not be configured to less than .5 seconds? I 
 suspect the latter, but it's not clear from the text.

[Ahmad]
Sure, will fix this as follows:

   Initial Minimum Delay Between BRI messages (InitMINDelayBRIs)

  This variable specifies the initial delay timeout in seconds
  before the revoking mobility entity retransmits a BRI message.
  The default is 1 second but not to be configured less than 0.5
seconds.



 
 -- Security Considerations:
 
 I think there is enough potential for confusion about when 
 IPSec is required to put some non-normative description of 
 when it is and isn't required, along with references to the 
 normative requirements.

[Ahmad]
I suppose this is just a comment that does not need clarification or
anything like that. 

Thanks again Ben for your review and comments!
 
 
 Thanks!
 
 Ben.
 
 
 
 
 
 On Sep 5, 2009, at 3:04 AM, Ahmad Muhanna wrote:
 
  Hello,
 
  We have updated the draft to address all comments.
  A URL for this Internet-Draft is:
  
 http://www.ietf.org/internet-drafts/draft-ietf-mext-binding-revocation
  -1
  1.txt
 
 
  In summary, here is a list of the major changes:
 
  1. Enhanced to the security text mainly under section 6.1. 
 and section
  13 (Security Considerations) to address Ben comments. In 
 addition, we 
  eliminated the Security Model section based on Ralph's comment.
 
  2. Enhanced the text for MAG authorization and defined a default 
  mechanism as specified under section 13, Security Considerations.
 
  3. Addressed Pasi's comments by adding text to clearly specify that 
  the current specification uses mobile node identifier 
 option, MN-ID, 
  with subtype 1, as stated mainly under section 5.1. In addition, we 
  defined the format of wild card NAI as per the use of this 
  specification, text under section 8.1.1.
 
  4. Addressed all the remaining of Ralph's detailed comments 
 in several 
  places of the document.
 
  5. Clarified that the responder sends BRA only if the 
 Acknowledge (A) 
  bit is set. Text was tweaked in several places.
 
  6. all nits and editorial comments
 
  Please let me know

Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-08 Thread Ahmad Muhanna
Hello,

We have updated the draft to address all comments. 
A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-mext-binding-revocation-1
1.txt


In summary, here is a list of the major changes:

1. Enhanced to the security text mainly under section 6.1. and section
13 (Security Considerations) to address Ben comments. In addition, we
eliminated the Security Model section based on Ralph's comment.

2. Enhanced the text for MAG authorization and defined a default
mechanism as specified under section 13, Security Considerations.

3. Addressed Pasi's comments by adding text to clearly specify that the
current specification uses mobile node identifier option, MN-ID, with
subtype 1, as stated mainly under section 5.1. In addition, we defined
the format of wild card NAI as per the use of this specification, text
under section 8.1.1.

4. Addressed all the remaining of Ralph's detailed comments in several
places of the document.

5. Clarified that the responder sends BRA only if the Acknowledge (A)
bit is set. Text was tweaked in several places.

6. all nits and editorial comments

Please let me know if you still have any issue.

Thanks for all of your comments and help!

Regards,
Ahmad
 

 -Original Message-
 From: Muhanna, Ahmad (RICH1:2H10) 
 Sent: Thursday, August 27, 2009 1:33 PM
 To: 'Ben Campbell'
 Cc: Khalil, Mohamed (RICH2:2S20); sgund...@cisco.com; 
 kchowdh...@starentnetworks.com; pyeg...@juniper.net; General 
 Area Review Team; ietf@ietf.org; Jari Arkko; 
 marc...@it.uc3m.es; Laganier, Julien
 Subject: RE: [PART-I] Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi, Ben,
 
  
   -Original Message-
  
   Summary: This draft is on the right track, but there are
  open issues.
   Additionally, I have a number of editorial comments.
  
   Major issues:
  
   -- I think the security considerations need quite a bit of
  work. In
   particular, there is very little guidance on authorization for 
   sending BRI messages. This seem to me have utility for DoS
  attacks,
   particularly with the G bit set.
   There is mention of reusing existing security associations
  if IPSec
   is used--but no mention of what to do if IPSec is not used.
   [Ahmad]
   Binding Revocation is used between two peers to 
 revoke/terminate a 
   mobility session(s) that have been created using an IPv6 mobility 
   protocol signaling (Client Mobile IPv6 or Proxy MIP6). 
 RFC3775 and 
   RFC5213, which are the main protocols targeted by this
  specification,
   specify that IPsec SHOULD be used. On the other hand, 
 there is NO 
   other standard track specification which specify other security 
   mechanisms to secure the IPv6 mobility signaling.
  Therefore, Binding
   Revocation specification assumes the use of whatever security 
   mechanism that currently available to secure the IPv6 mobility 
   signaling.
  
  I think there are still a couple of issues here. First, Since the 
  underlying RFCs only specify IPSec at SHOULD strength, this draft 
  needs to discuss the consequences of not using it for BRI. 
 Depending 
  on those consequences, it might be enough to just warn implementors 
  that, if you don't use IPSec, certain bad things can happen.
 [Ahmad]
 It is NOT expected that BRI/BRA will use a different security 
 mechanism than what is being used for securing IPv6 mobility 
 signaling. Therefore, in order to alert implementors of the 
 danger if IPsec is NOT used, IMO, that needs to be discussed 
 in related IPv6 mobility specifications, e.g., RFC3775 and 
 RFC5213, which is already there. On the other hand, it is 
 very difficult to anticipate the criteria of other security 
 mechanisms that would possibly be used in the future to 
 secure IPv6 mobility signaling and consequently BRI/BRA. 
 
 
  OTOH, it might be that BRI has
  greater security risks than for 3775/5213, and you might (for
  example) need to strengthen the IPSec requirement for BRI.
  
  I admit to not being an expert on 3375/5213, so it may be true that 
  BRI is no riskier than the underlying technology--but even 
 if that is 
  true I'd like to see some discussion to support it.
 [Ahmad]
 Both IPv6 mobility signaling and BRI/BRA use the same IPv6 
 layer signaling. I am not sure what impact the underlying 
 technology has on BRI./BRA that does not have on BU/BA.
 
  
  Second, I think that there is probably more guidance needed on 
  authorization decisions even if you do use IPSec. For 
 example, do you 
  assume that any trusted peer can remove any binding?
 [Ahmad]
 No. The revoking mobility entity revokes only those mobility 
 session(s) which are registered with it. No mobility node can 
 revoke a mobility session that is registered with a different 
 trusted mobility node.
 
 
  Is a trusted peer only allowed to remove bindings that it 
 previously 
  established using the same SA?
 [Ahmad]
 I believe I addressed this via another comment earlier. The 
 answer is NO.
 
 

RE: [PART-II] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-02 Thread Ahmad Muhanna
 
  -- S7.2, paragraph 2: Since some mobility entities, e.g., local 
  mobility anchor and mobile access gateway, are allowed 
 to receive 
  and possibly send a Binding Revocation Indication or Binding 
  Revocation Acknowledgement for different cases, 
 therefore, if IPsec 
  is used to secure signaling between the local mobility 
 anchor and 
  mobile access gateway, it prevents any of them from processing a 
  Binding Revocation message that was not constructed by an 
  authorized party.
 
  I have trouble parsing this sentence.
 
  (You did not respond to this one.)
 
  [Ahmad]
  We basically wanted to say that since the MAG and LMA are 
 both allowed 
  to send BRI and receive BRA, IPsec will enable the peer to 
 detect if a 
  man in the middle, for example, reflected a BRI message that it has 
  initiated back to the peer and consequently silently drop that BRI 
  message. In the broader sense, we wanted to say that IPsec 
 enables any 
  of the peers to detect if the received BRI is coming from an 
  unauthorized party and consequently ignore without processing it.
 
  I hope we got it right:)
 
 I think if you replace the .. allowed
 to receive and possibly send a Binding Revocation Indication 
 or Binding Revocation Acknowledgement for different cases 
 with ...allowed to send BRI and receive BRA, it would be 
 easier to read.

[Ahmad]
Sure, makes sense.

Thanks again for all the comments. 
Hopefully will get a new revision before the end of the week.

Regards,
Ahmad

___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [PART-I] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-02 Thread Ahmad Muhanna
Hi Ben,
Please see inline.

Regards,
Ahmad
 -Original Message-
 
 
 
  I still have concerns about the use of IPSec, though, as without 
  IPSec of some other form of authentication, an attacker could 
  conceivably impersonate the node that bindings were 
 associated with. 
  This is particularly bothersome in use cases that allow a node to 
  revoke bindings without having to know the details of each 
 individual 
  binding, such as the G-bit, or an included NAI of the form 
  @example.com.
 
  I'm not saying that this draft needs to make IPSec into a MUST.
  [Ahmad]
  If it comes to me, I am comfortably fine with that:)
 
  But it is appropriate for it to point out that if you 
 _don't_ use it, 
  bad things could happen. (See my comment on that point 
 further down.)
 
  It may be that using MIPv6 without IPSec is just as bad 
 without BRI 
  as with it--in which case it's fair to say that any 
 attacks enabled 
  by not using IPSec with BRI are no worse than using the base 
  technologies without BRI. (Such statements are easier to 
 believe with 
  some discussion to support them, though :-) )
 
  [Ahmad]
  When IPsec is used, the only issue that we identified that needs 
  special attention was the Global Revocation with Revocation Trigger 
  value Per-Peer Policy when sent from the MAG [because it 
 deletes all 
  sessions between the two peers]. Although, some people 
 still disagreed 
  that there is no great risk in there and no special 
 treatment should 
  take place. At any rate, since this message coming from a 
 peer in the 
  visited network, we wanted the home network to have the 
 upper hand and 
  be able to give specific privileges to peers in the 
 different visited 
  networks, i.e., MAGs. What this means? the ability to establish an 
  IPsec SA between the MAG and the LMA does not give the MAG the 
  automatic privilege to use Global Revocation with 
 Revocation Trigger 
  value of per-Peer Policy. That why we required authorization.
 
 
 Again, I'm looking for discussion on what the impact of 
 choosing _not_ to use IPSec, since it is only required at a 
 SHOULD strength. I think the answer to the similar point below helps.
[Ahmad]
Ok. 

 
 
 
  More inline:
 
  On Aug 27, 2009, at 1:32 PM, Ahmad Muhanna wrote:
 
  Hi, Ben,
 
 
  -Original Message-
 
  Summary: This draft is on the right track, but there are
  open issues.
  Additionally, I have a number of editorial comments.
 
  Major issues:
 
  -- I think the security considerations need quite a bit of
  work. In
  particular, there is very little guidance on authorization for 
  sending BRI messages. This seem to me have utility for DoS
  attacks,
  particularly with the G bit set.
  There is mention of reusing existing security associations
  if IPSec
  is used--but no mention of what to do if IPSec is not used.
  [Ahmad]
  Binding Revocation is used between two peers to
  revoke/terminate a
  mobility session(s) that have been created using an 
 IPv6 mobility 
  protocol signaling (Client Mobile IPv6 or Proxy MIP6).
  RFC3775 and
  RFC5213, which are the main protocols targeted by this
  specification,
  specify that IPsec SHOULD be used. On the other hand,
  there is NO
  other standard track specification which specify other security 
  mechanisms to secure the IPv6 mobility signaling.
  Therefore, Binding
  Revocation specification assumes the use of whatever security 
  mechanism that currently available to secure the IPv6 mobility 
  signaling.
 
  I think there are still a couple of issues here. First, 
 Since the 
  underlying RFCs only specify IPSec at SHOULD strength, 
 this draft 
  needs to discuss the consequences of not using it for BRI.
  Depending
  on those consequences, it might be enough to just warn
  implementors
  that, if you don't use IPSec, certain bad things can happen.
  [Ahmad]
  It is NOT expected that BRI/BRA will use a different security 
  mechanism than what is being used for securing IPv6 mobility 
  signaling.
  Therefore,
  in order to alert implementors of the danger if IPsec is 
 NOT used, 
  IMO, that needs to be discussed in related IPv6 mobility 
  specifications, e.g., RFC3775 and RFC5213, which is already
  there. On
  the other hand, it is very difficult to anticipate the 
 criteria of 
  other security mechanisms that would possibly be used in
  the future to
  secure IPv6 mobility signaling and consequently BRI/BRA.
 
 
  Sure--but it's appropriate for the BRI spec to say If BRI is used 
  without IPSec, these bad things can happen in addition to the bad 
  things that might happen if you use the base technology without 
  IPSec. Or alternatively,
 
  The bad things
  that can happen with BRI without IPSec are functionally 
 identical to 
  those for the base technology, so the IPSec related security 
  considerations are identical to those in RFC/).
  [Ahmad]
  We can add something similar to this. Thx.
 
 Okay, thanks!
 
 
 
 
 
 
 
 
  OTOH, it might

RE: [PART-I] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-09-02 Thread Ahmad Muhanna
Hi Ben,
Please see inline.

Regards,
Ahmad

 -Original Message-
 From: Ben Campbell [mailto:b...@estacado.net] 
 Subject: Re: [PART-I] Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 On Sep 1, 2009, at 3:35 PM, Ahmad Muhanna wrote:
 
 [...]
 
 
  So is it true that using bulk revocation without IPSec 
 could make it 
  possible for an attacker to masquerade as an authorized party, and 
  delete large numbers of bindings with a single BRI?
  [Ahmad]
  Well, we need to be a little careful here:) I think what 
 you meant to 
  say here is without any security mechanism.
 
 In particular, without an authentication mechanism.
 
  So, If no valid SA is being used to protect the binding revocation 
  signaling and, I assume, the MIP6/PMIP6 signaling, then a 
 lot of bad 
  things could happen.
 
 Right, and those bad things seem at least slightly worse with 
 BRI than without it, due to the bulk revocation mechanism--so 
 additional mention seems appropriate.
[Ahmad]
Will try to address this in the new revision. Hopefully, this week.

 
 
 
 
  Or there
  underlying architectural features that prevent or make this hard?
  [Ahmad]
  I am not quite sure what you mean by the underlying architectural 
  features in this context. But I can say the following: If 
 no security 
  mechanism (SA) is being used, neither BU/BA nor BRI/BRA are 
 allowed to 
  be used for establishing nor revoking mobility sessions.
 
 
 Hmm--maybe this is all some confusion on my part. Somewhere I 
 got the impression the requirement to use IPSec for BU 
 messages was SHOULD strength. But in rereading RFC3775, I see 
 it at MUST strength. But I am then confused by the language 
 in this draft that says If IPSec is used...
 
 So, to close on this--do you consider the _use_ of IPSec for 
 BRI to be a SHOULD or MUST? If it's a MUST, then I withdraw 
 my comments about what happens if you don't use IPSec?, and 
 apologize for the confusion.
[Ahmad]
As you mentioned, RFC3775 mandates the use of IPsec to protect BU/BA
between the MN and the HA. However, RFC5213, Proxy Mobile IPv6, mandates
the implementation of IPsec on the MAG and LMA. So, as you see it is not
straight forward:) On the other hand, I understand what you are trying
to say. Let me work with the authors on this and will share the security
related text before publishing. I am sure we can come up with a text
that reasonably address your concern while staying within the wg
consensus.

 
 
  think just discussing that in the SecCon would go a long 
 way towards 
  addressing my concerns.)
  [Ahmad]
  I am in the process of rewriting the security section and the whole 
  draft to address all comments. Will revaluate before publishing 
  whether we need anything specific here.
 
 Okay.
 
 Thanks!
 
 Ben.
 
___
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf


RE: [PART-II] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-08-31 Thread Ahmad Muhanna
Hi, Ben,
Sorry for the late reply, hope to close on all comments; please see
inline.

 -Original Message-
 
 [...]
 
  [PART-II]
 
  Nits/editorial comments:
 
  -- General: 
 
 I understand that, and I hope I didn't come off too critical. 
 I know that it is very hard to make a draft that is both 
 readable and correct, particularly when you have so many use 
 cases that require different application behavior.
[Ahmad]
Not at all. I thank you much for the thorough review and comments!

 
 
  -- Same paragraph, last sentence:
 
  Do you mean user or mobile node?
 
  [Ahmad]
  I meant the user, because if the reason, administrative, then it 
  probably requires the user intervention.
 
 Interesting. I assume there are cases where a typical mobile 
 node would just quietly reestablish the binding. I gather you 
 expect cases where it can't do so without some (possibly 
 reconfiguration) effort on the user's part, right? It's worth 
 thinking about whether there is some guidance you can give to 
 implementors here. (I'm not sure there is--just something to 
 think about.)
[Ahmad]
Probably we can allow it to be applicable to the user and mobile node.
What about if we just state This mechanism enables the user or the
mobile node to react .. 
 
 
 
  -- S3.4.1, first paragraph, first sentence:
 
  Unclear sentence: What is doing the hosting? The LMA, 
 the MAG, or 
  the BRI message? I think you mean the MAG, but the 
 sentence structure 
  is ambiguous.
  [Ahmad]
  What about the following?
 
  
The local mobility anchor may send a Binding Revocation Indication
message with the appropriate revocation trigger value to 
 the mobile
access gateway which hosts a specific PMIPv6 binding to indicate 
  that
the mobile node binding has been terminated and the mobile access 
  gateway
can clean up the applicable resources.
 
 s/which/that, but otherwise I think it works.

[Ahmad]
Ok.

 
 
 
  -S 7.1, first paragraph: node, initiator, constructs
 
  Confusing sentence structure. Is initiator a name for 
 the sending 
  mobility node? If so, it would help to use it later
  [Ahmad]
  Sure. Will remove it.
 
 Actually, I meant to propose you keep it, so that you could 
 simplify later sentences. For example, you could substitute 
 The initiatior  
 for The mobility node that sends a Binding Revocation 
 Indication message.
[Ahmad]
Ok.

 
 
  (the next paragraph uses the same structure again.)
 
  -- 2nd paragraph: In the BRI message, the initiator MUST set the 
  Sequence Number field to the next sequence number available for 
  Binding Revocation
 
  Does this conflict with the section 6.1 statement that it 
 could be 
  random
  [Ahmad]
  I do not see a conflict with sec 6.1. If the sequence random is set 
  using a random generator, then the next sequence number is 
 random too.
 
 I think there is some danger that an implementor will be 
 confused by the words sequence and next for something 
 that is not necessarily sequential. I gather you don't care 
 how the implementation selects this number as long as there 
 are no collisions, right? 
[Ahmad]
Yes.

 It might be helpful to have a 
 sentence or two that say that--as it could be random 
 doesn't fully explain that you expect this to be local policy.

[Ahmad]
Sure.

 
 More importantly, this implies a requirement that the 
 responder MUST NOT attempt to infer meaning from the sequence 
 numbers--for example, out-of-sequence numbers are 
 meaningless. 
[Ahmad]
True. The use of the sequence number is to enable the initiator to match
the BRA with the outstanding associated BRI. Since the chance of having
more than one outstanding BRI, we MUST make sure that there is no
collision.

 Also, if an implementation chose to use 
 sequential values, does it have to worry about rollovers? 
[Ahmad]
No.
 
 Does the potential guess-ability of a sequence number have 
 security implications?

[Ahmad]
Not at all. Packet must pass IPsec authentication first.
 
 
 
  -- Same Paragraph: Since sending Binding Revocation Indication 
  message is not done on a regular basis, a 16 bit sequence number 
  field is large enough to allow the initiator to match the Binding 
  Revocation Acknowledgement to the outstanding Binding Revocation 
  Indication with Acknowledge
  (A) bit set using the sequence number field only.
 
  Sentence is hard to follow. I suggest separating the idea that you 
  can match BRAs to BRIs with a 16 bit sequence number from the idea 
  that you only get a BRA if the BRI had it's A bit set.
 
  [Ahmad]
  Sure. What about the following:
 
  Since sending Binding Revocation Indication message is not 
 done on a 
  regular basis, a 16 bit sequence number field is large 
 enough to allow 
  the initiator to match the Binding Revocation 
 Acknowledgement to its 
  outstanding Binding Revocation Indication that had the 
 Acknowledge (A) 
  bit set.
 
 Actually, I think the point would be clearer if you dropped 
 the part about the A bit 

RE: [PART-I] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-08-31 Thread Ahmad Muhanna
Hi Ben,
Will address and comment on open ones. Please see inline.

Regards,
Ahmad

 -Original Message-

 Subject: Re: [PART-I] Gen-ART LC and Telechat Review of 
 draft-ietf-mext-binding-revocation-10
 
 Hi Ahmad,
 
 Let me comment on the security issues at a high level up 
 front, since I think I can tie together responses to several 
 of your comments below. More specific comments imbedded:
 
 I think the email from Jari helped clarify things for me to a 
 point that I can make my concerns a little more precise. You 
 clarify further down that mobile nodes are _never_ allowed to 
 revoke bindings that weren't associated with them in the 
 first place. This actually addresses a lot of my concerns, 
 and I think it is fundamental enough to be reiterated in the 
 SecCons section.
[Ahmad]
Sure, we can make that clear.

 
 I still have concerns about the use of IPSec, though, as 
 without IPSec of some other form of authentication, an 
 attacker could conceivably impersonate the node that bindings 
 were associated with. This is particularly bothersome in use 
 cases that allow a node to revoke bindings without having to 
 know the details of each individual binding, such as the 
 G-bit, or an included NAI of the form @example.com.
 
 I'm not saying that this draft needs to make IPSec into a 
 MUST. 
[Ahmad]
If it comes to me, I am comfortably fine with that:)

 But it is appropriate for it to point out that if you 
 _don't_ use it, bad things could happen. (See my comment on 
 that point further down.)
 
 It may be that using MIPv6 without IPSec is just as bad 
 without BRI as with it--in which case it's fair to say that 
 any attacks enabled by not using IPSec with BRI are no worse 
 than using the base technologies without BRI. (Such 
 statements are easier to believe with some discussion to 
 support them, though :-) )

[Ahmad]
When IPsec is used, the only issue that we identified that needs special
attention was the Global Revocation with Revocation Trigger value
Per-Peer Policy when sent from the MAG [because it deletes all
sessions between the two peers]. Although, some people still disagreed
that there is no great risk in there and no special treatment should
take place. At any rate, since this message coming from a peer in the
visited network, we wanted the home network to have the upper hand and
be able to give specific privileges to peers in the different visited
networks, i.e., MAGs. What this means? the ability to establish an IPsec
SA between the MAG and the LMA does not give the MAG the automatic
privilege to use Global Revocation with Revocation Trigger value of
per-Peer Policy. That why we required authorization.

 
 More inline:
 
 On Aug 27, 2009, at 1:32 PM, Ahmad Muhanna wrote:
 
  Hi, Ben,
 
 
  -Original Message-
 
  Summary: This draft is on the right track, but there are
  open issues.
  Additionally, I have a number of editorial comments.
 
  Major issues:
 
  -- I think the security considerations need quite a bit of
  work. In
  particular, there is very little guidance on authorization for 
  sending BRI messages. This seem to me have utility for DoS
  attacks,
  particularly with the G bit set.
  There is mention of reusing existing security associations
  if IPSec
  is used--but no mention of what to do if IPSec is not used.
  [Ahmad]
  Binding Revocation is used between two peers to 
 revoke/terminate a 
  mobility session(s) that have been created using an IPv6 mobility 
  protocol signaling (Client Mobile IPv6 or Proxy MIP6). 
 RFC3775 and 
  RFC5213, which are the main protocols targeted by this
  specification,
  specify that IPsec SHOULD be used. On the other hand, 
 there is NO 
  other standard track specification which specify other security 
  mechanisms to secure the IPv6 mobility signaling.
  Therefore, Binding
  Revocation specification assumes the use of whatever security 
  mechanism that currently available to secure the IPv6 mobility 
  signaling.
 
  I think there are still a couple of issues here. First, Since the 
  underlying RFCs only specify IPSec at SHOULD strength, this draft 
  needs to discuss the consequences of not using it for BRI. 
 Depending 
  on those consequences, it might be enough to just warn 
 implementors 
  that, if you don't use IPSec, certain bad things can happen.
  [Ahmad]
  It is NOT expected that BRI/BRA will use a different security 
  mechanism than what is being used for securing IPv6 mobility 
  signaling.
  Therefore,
  in order to alert implementors of the danger if IPsec is NOT used, 
  IMO, that needs to be discussed in related IPv6 mobility 
  specifications, e.g., RFC3775 and RFC5213, which is already 
 there. On 
  the other hand, it is very difficult to anticipate the criteria of 
  other security mechanisms that would possibly be used in 
 the future to 
  secure IPv6 mobility signaling and consequently BRI/BRA.
 
 
 Sure--but it's appropriate for the BRI spec to say If BRI is 
 used without IPSec

RE: [PART-I] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-08-27 Thread Ahmad Muhanna
Hi Ben,
Thanks for the detailed review and comments. 
Please allow me to address your comments in two parts. 

1. PART-I: Major and technical issues.
2. PART-II: remaining comments.

Please see answers inline for PART-I.

Regards,
Ahmad

 -Original Message-
 
 Summary: This draft is on the right track, but there are open 
 issues.  
 Additionally, I have a number of editorial comments.
 
 Major issues:
 
 -- I think the security considerations need quite a bit of 
 work. In particular, there is very little guidance on 
 authorization for sending BRI messages. This seem to me have 
 utility for DoS attacks, particularly with the G bit set. 
 There is mention of reusing existing security associations if 
 IPSec is used--but no mention of what to do if IPSec is not 
 used. 
[Ahmad]
Binding Revocation is used between two peers to revoke/terminate a
mobility session(s) that have been created using an IPv6 mobility
protocol signaling (Client Mobile IPv6 or Proxy MIP6). RFC3775 and
RFC5213, which are the main protocols targeted by this specification,
specify that IPsec SHOULD be used. On the other hand, there is NO
other standard track specification which specify other security
mechanisms to secure the IPv6 mobility signaling. Therefore, Binding
Revocation specification assumes the use of whatever security mechanism
that currently available to secure the IPv6 mobility signaling.


 (Perhaps it is required by the underlying technology? 
 If so, that should be mentioned here.) 
[Ahmad]
That is not the intention. Please see above.

 You mention that 
 authorization is required if the G-bit is set, but go on to 
 say authorization details are out of scope. I think that this 
 draft needs to either offer much more guidance on 
 authentication requirements. 
[Ahmad]
We could introduce a simple default mechanism inline with what we have
in RFC5213. 

 It would be helpful if the 
 Security Considerations section discussed the consequences of 
 security failures, possible attacks, etc.
 
[Ahmad]
This specification do not introduce any security threats on the top of
what is being discussed in Client MIP6 and Proxy MIP6, RFC3775 and
RFC5213.

 
 
 Minor issues:
 
 -- S3.4.2, paragraph 1: responds with the appropriate status 
 code by sending a Binding Revocation Acknowledgement message
 
 Always, or just if the A bit is set?
[Ahmad]
This section describes the usecase when Global revocation is being used
by the MAG; there is no normative text in this section. In addition,
section 10.2.1. which talks about the use of the (G) bit by the MAG and
indicates that whenever the (G) bit is set the (A) bit MUST be set, is
correctly being referenced in this section and mentioned before the text
quoted above. 

 
 
 -S4, paragraph 2: verify that the mobile access gateway 
 sending the binding revocation indication message is 
 authorized to invoke global revocation
 
 How does it make such a verification?
[Ahmad]
By checking the identity of the MAG if it is authorized for global
revocation or not. Would a reference to section 9.2.1. makes it clearer
or you think we need to add more clarification.

 
 -S5, second paragraph: UDP encapsulation to traverse NATs
 
 Can you include a reference for UDP encapsulation?
[Ahmad]
No problem.

 
 -- Same Paragraph: ... port numbers ... will also be used
 
 Should this be normative?
 
 -- Same paragraph, sentence starting with For example...
 
 I don't think it's appropriate to include a normative 
 statement inside an example. You could fix this by swapping 
 the descriptive language in the previous sentence with the 
 normative language in the example.
[Ahmad]
Agreed. Will fix swap as suggested. Thanks.

 
 -- Section 7.2, last paragraph: If a mobility node receives 
 a Binding Revocation Indication message with a Revocation 
 Trigger value that is NOT in line with the Binding Revocation 
 Indication message intent, e.g., the Global (G) bit set and 
 the Revocation Trigger field vale is a per-MN specific, the 
 receiving mobility node SHOULD reject the Binding Revocation 
 Indication message by sending a Binding Revocation 
 Acknowledgement message with the Status field set to 
 Revocation Function NOT Supported.
 
 This paragraph seems to imply some under-specification around 
 how to tell the Revocation Trigger value is not in line with 
 the initiator's intent.
 
 Also, do you really mean to send ... not supported? This 
 really sounds like more of a bad request scenario.
 
 Did you mean to capitalize the final NOT?
[Ahmad]
I thought it was a straight forward combination. If the Global (G) bit
is set, the Revocation trigger field value MUST contain one of the
Global revocation triggers. If the (G) bit is cleared, the revocation
trigger MUST contain a per-MN value. Any deviation, means this
functionality is not supported.

As far as why having NOT in capital letters, some drafts have the
whole cause value in capital letters, but it is also meant to say that
this is a bad request.

 
 -- 

RE: [PART-II] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-08-27 Thread Ahmad Muhanna
Hi Ben,
Please see answers in line for PART-II.

 -Original Message-
 From: Ben Campbell [mailto:b...@estacado.net] 
 Subject: Gen-ART LC and Telechat Review of
draft-ietf-mext-binding-revocation-10
 
 I have been selected as the General Area Review Team 
 (Gen-ART) reviewer for this draft (for background on Gen-ART, 
 please see http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
 
 Please wait for direction from your document shepherd or AD 
 before posting a new version of the draft.
 
 Document: draft-ietf-mext-binding-revocation-10
 Reviewer: Ben Campbell
 Review Date: 25 Aug 2009
 IESG Telechat date: 27 Aug 2009
 
 Note: I was assigned to review revision 08 of this draft for 
 the last call ending 28 Aug, as well as this version (10) for 
 the 27 Aug Telechat. This review serves both purposes.
 
 Summary: This draft is on the right track, but there are open 
 issues.  
 Additionally, I have a number of editorial comments.
 

[PART-II]
 
 Nits/editorial comments:
 
 -- General: 
 
 This draft has some significant organization issues that make 
 it harder to read than it needs to be. In particular, the 
 sections that discuss protocol details keep repeating text 
 that is effectively the same for each type of device. It 
 would be much easier to read if you did things like separate 
 out acknowledgement handling, race condition handling, 
 binding identification, retransmissions,  handovers, etc into 
 their own sections, and have the sections on specific device 
 roles only discuss things specific to those devices. You have 
 some of the common bits separated out, but you still repeat 
 them over and over in the role specific sections. Not only is 
 this hard to read, it is prone to error.
[Ahmad]
Thanks. I appreciate this comment. 
Will make every effort to correct any error or unnecessary duplication. 
It may be worth noting that describing a protocol which handles the
interactions of several entities and usecases that are established using
different protocols is not the easiest job ever:)

 
 As an example, I found that this structure confused my 
 attempts to understand when an acknowledgement is required. 
 Some sections said if the Acknowledge bit was set, but 
 other sections that did not mention the A bit also required 
 acknowledgement.
[Ahmad]
I think we discussed this in PART-I and will follow up on your follow-up
comments after addressing all of PART-II comments.

 
 The sentence structure tends to be very long and wordy, with 
 very little punctuation. This is aggravated by the fact that 
 you don't make use of the acronyms and device role names once 
 you establish them. For example, spelling out phrases like 
 Binding Revocation Indication and Local Mobility Anchor every 
 time they are used makes for very long sentences.

[Ahmad]
I see what you are saying. However, we are trying to follow the style of
main IP mobility protocols specifications. It seems that there are two
styles for doing this. One is to always use acronyms as soon as they are
established. TWO: do not use acronyms except in figures and tables, if
they exist and text related to them. I personally prefer a combination
of these two styles but the comments we received earlier during the
development of this specification is to use one or the other:) 

 
 Please proof read the draft again. 
[Ahmad]
Sure. Will try again. Appreciate your effort in finding some of them; I
should say many!

 I found lots of missing 
 articles and plural/singular mismatches. I report a few of 
 these below, but I gave up on capturing them part way 
 through. The RFC editor will probably fix any of these that 
 get through, but if you fix it yourself, there is less danger 
 of the meaning being changed by edits.
[Ahmad]
Will do our best to catch the remaining ones.

 
 -- S1, paragraph 2:
 
 Please expand MH on first use.
[Ahmad]
Ok.
 
 notify its local mobility anchor peer with a bulk termination
 
 Does it really notify with a bulk termination, or about a 
 bulk termination?
[Ahmad]
Thx. Will use about.

 
 -- S3: describe the protocol overview
 
 s/describe/present
[Ahmad]
Ok.

 
 -- S3.1, paragraph 1:the Acknowledge (A) bit is set
 
 The description seems to mix the two elements--the 
 notification and the request for acknowledgement. It might be 
 easier to read and understand if you separated out a  single 
 section on sending BRA when the A bit is set, rather than 
 repeating it for each scenario.
 
 -- Paragraph 3: On the other hand, the mobile access gateway 
 usually sends a de- registration message by sending a Proxy 
 Binding Update with a lifetime of zero to indicate to the 
 local mobility anchor of the termination of the PMIPv6 mobile 
 node binding registration.
 
 Sentence logic is inverted. Suggest  ... indicate the 
 termination...to the local mobility anchor This sentence 
 structure repeats throught the document. While the inverted 
 form is not technically wrong, it's difficult to read (for 
 me, anyway).
 
 -- 

RE: [PART-I] Gen-ART LC and Telechat Review of draft-ietf-mext-binding-revocation-10

2009-08-27 Thread Ahmad Muhanna
Hi, Ben,

 
  -Original Message-
 
  Summary: This draft is on the right track, but there are 
 open issues.
  Additionally, I have a number of editorial comments.
 
  Major issues:
 
  -- I think the security considerations need quite a bit of 
 work. In 
  particular, there is very little guidance on authorization for 
  sending BRI messages. This seem to me have utility for DoS 
 attacks, 
  particularly with the G bit set.
  There is mention of reusing existing security associations 
 if IPSec 
  is used--but no mention of what to do if IPSec is not used.
  [Ahmad]
  Binding Revocation is used between two peers to revoke/terminate a 
  mobility session(s) that have been created using an IPv6 mobility 
  protocol signaling (Client Mobile IPv6 or Proxy MIP6). RFC3775 and 
  RFC5213, which are the main protocols targeted by this 
 specification, 
  specify that IPsec SHOULD be used. On the other hand, there is NO 
  other standard track specification which specify other security 
  mechanisms to secure the IPv6 mobility signaling. 
 Therefore, Binding 
  Revocation specification assumes the use of whatever security 
  mechanism that currently available to secure the IPv6 mobility 
  signaling.
 
 I think there are still a couple of issues here. First, Since 
 the underlying RFCs only specify IPSec at SHOULD strength, 
 this draft needs to discuss the consequences of not using it 
 for BRI. Depending on those consequences, it might be enough 
 to just warn implementors that, if you don't use IPSec, 
 certain bad things can happen. 
[Ahmad]
It is NOT expected that BRI/BRA will use a different security mechanism
than what is being used for securing IPv6 mobility signaling. Therefore,
in order to alert implementors of the danger if IPsec is NOT used, IMO,
that needs to be discussed in related IPv6 mobility specifications,
e.g., RFC3775 and RFC5213, which is already there. On the other hand, it
is very difficult to anticipate the criteria of other security
mechanisms that would possibly be used in the future to secure IPv6
mobility signaling and consequently BRI/BRA. 


 OTOH, it might be that BRI has 
 greater security risks than for 3775/5213, and you might (for 
 example) need to strengthen the IPSec requirement for BRI.
 
 I admit to not being an expert on 3375/5213, so it may be 
 true that BRI is no riskier than the underlying 
 technology--but even if that is true I'd like to see some 
 discussion to support it.
[Ahmad]
Both IPv6 mobility signaling and BRI/BRA use the same IPv6 layer
signaling. I am not sure what impact the underlying technology has on
BRI./BRA that does not have on BU/BA.

 
 Second, I think that there is probably more guidance needed 
 on authorization decisions even if you do use IPSec. For 
 example, do you assume that any trusted peer can remove any 
 binding? 
[Ahmad]
No. The revoking mobility entity revokes only those mobility session(s)
which are registered with it. No mobility node can revoke a mobility
session that is registered with a different trusted mobility node.


 Is a trusted peer only allowed to remove bindings 
 that it previously established using the same SA? 
[Ahmad]
I believe I addressed this via another comment earlier. The answer is
NO.

 If an SA is 
 torn down and a new one established, what authorization gets 
 inherited, if any? 
[Ahmad]
When the SA is torn down and a new one is established, the new SA is
valid for both BU/BA and BRI/BRA. In other words, the new SA will still
have the same SPD which allows the BU/BA and BRI/BRA messages, etc. If
your question is about authorization of Global revocation, that
authorization should be done separately.

 Do you assume that a peer that is trusted 
 to establish bindings is trusted for BRI? 
[Ahmad]
Of course. The node which initiated or granted the registration should
have the authority to revoke it. 
Do you see any problem there? 

 Do you need to 
 provision policies around these, and if so what are the moving parts?

[Ahmad]
The text under the security section was supposed to capture this. The
SPD should be updated to allow MH type of 'Binding Revocation message'.
If it is not enough, let us know what is missing and we can add/modify
as needed.

 
 
 
  (Perhaps it is required by the underlying technology?
  If so, that should be mentioned here.)
  [Ahmad]
  That is not the intention. Please see above.
 
  You mention that
  authorization is required if the G-bit is set, but go on to say 
  authorization details are out of scope. I think that this 
 draft needs 
  to either offer much more guidance on authentication requirements.
  [Ahmad]
  We could introduce a simple default mechanism inline with 
 what we have 
  in RFC5213.
 
 It's possible that might help--can you point to the section 
 of 5213 you have in mind? 

[Ahmad]
Section 4, paragraph 6.

 It might also be enough to have 
 more discussion on what an implementor needs to think about 
 to do authorization correctly. For example, does it 

Looking for a social ticket

2008-03-11 Thread Ahmad Muhanna
Hi,
 
If anyone have an extra social event ticket, please respond to me
directly.
Thanks in advance!

Regards, 
Ahmad 

___
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf