Re: [IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Michael Richardson

Tero Kivinen  wrote:
> Murray S. Kucherawy writes:
>> This posture worries me.  I've no doubt that you're doing a fine job
>> as the DE for the registries for which you're responsible, probably
>> because you were around during IPSec's development.  But what about
>> your successor(s)?  Will they have all of the context, background, and
>> vision you have in order to continue where you eventually leave off?

> Designated experts are called experts, not automation robots following
> steps set in RFCs. My understanding has been that the reason we use
> experts is that then we do not need to give them exact rules to
> follow. Some of the RFCs gives so strict rules for experts to follow,
> that there really is no point of having expert involved at all, IANA
> could simply follow those same steps themselves.

I very very strongly concur with Tero here.
This trend to constraining experts is a problem.
Either we/the IESG trusts the experts, or they don't.
And, either way, if the WG is happy with the instructions, then the let the
WG be.

> We currently have two experts for the IPsec registries (another one was
> added few years back). Also I would assume there is pool of about 5-10
> people in the IETF that could easily work as an expert on the IPsec
> registries on the short notice (whether they would be willing or having
> time is another issue :-)

> On the other hand IPsec registries are easy, as we do have active group
> of people still working on it, meaning we have active mailing list and
> in case there are issues where experts are unsure, the experts can go
> and verify the decisions on the mail list.

Yes... if there is any doubt, the expert can come to the list with questions.
I've seen other experts do this regularly.

--
Michael Richardson. o O ( IPv6 IøT consulting )
   Sandelman Software Works Inc, Ottawa and Worldwide


signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Tero Kivinen
Murray S. Kucherawy writes:
> This posture worries me.  I've no doubt that you're doing a fine job as the DE
> for the registries for which you're responsible, probably because you were
> around during IPSec's development.  But what about your successor(s)?  Will
> they have all of the context, background, and vision you have in order to
> continue where you eventually leave off?

Designated experts are called experts, not automation robots following
steps set in RFCs. My understanding has been that the reason we use
experts is that then we do not need to give them exact rules to
follow. Some of the RFCs gives so strict rules for experts to follow,
that there really is no point of having expert involved at all, IANA
could simply follow those same steps themselves.

We currently have two experts for the IPsec registries (another one
was added few years back). Also I would assume there is pool of about
5-10 people in the IETF that could easily work as an expert on the
IPsec registries on the short notice (whether they would be willing or
having time is another issue :-)

On the other hand IPsec registries are easy, as we do have active
group of people still working on it, meaning we have active mailing
list and in case there are issues where experts are unsure, the
experts can go and verify the decisions on the mail list.

> The IETF, I'm coming to believe, has generally not done a good
> enough job of succession planning.  This is one place where we can
> shore up that problem.
> 
> I'll clear my DISCUSS, but I urge the working group and sponsoring
> AD to give this some more thought.

We currently have two experts for IPsec related IANA registries, so we
have already given this some thought... 
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps
As we were directed by both INT ADs at this point, and had no object by the 
other ADs during the telechat call, I've treated this as a "take our money" 
moment and have requested early allocation of an IP protocol code point to move 
things forward.

If in the (distant?) future INT needs to take back the code point b/c they've 
run out we woulbe be able to accommodate them.

Thanks,
Chris.

> On Aug 25, 2022, at 12:35, Paul Wouters  wrote:
> 
> Indeed, they was the conclusion of the transport area at the time. I would 
> also prefer we could stick with that better solution, but more importantly I 
> don’t want this document stopped by a DISCUSS on either side of this argument.
> 
> Paul
> 
> Sent using a virtual keyboard on a phone
> 
>> On Aug 25, 2022, at 12:28, Michael Richardson  wrote:
>> 
>> 
>>> On Aug 25, 2022, at 00:52, Erik Kline  wrote:
>>> I think this document needs to request a protocol number from IANA.
>> 
>> Erik, the WG had this debate at length two+ years ago.
>> 
>> I feel that the WG, through our AD, asked the IESG and the IntArea and
>> Transport Area this specific question in a number of different ways to be 
>> sure.
>> 
>> We decided not to go that way because we felt that it was a waste of a very
>> scarce resource.
>> 
>> --
>> Michael Richardson. o O ( IPv6 IøT consulting )
>>  Sandelman Software Works Inc, Ottawa and Worldwide
>> 
>> 
>> 
>> 
>> ___
>> IPsec mailing list
>> IPsec@ietf.org
>> https://www.ietf.org/mailman/listinfo/ipsec
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Lars Eggert's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Martin Duke
If it were me, I might add "unless all inner packets have the same
marking", but I won't die on that hill.

On Thu, Aug 25, 2022 at 10:57 AM Christian Hopps  wrote:

>
> Martin Duke  writes:
>
> > I'm not sure we've landed on a good solution with the ECN text.  Two
> > weeks ago I pushed Christian to do something more sophisticated with
> > ECN, but realized that this is such a complicated subject that I
> > wrote a draft (which, to my knowledge, no one has read):
> >
> > https://datatracker.ietf.org/doc/
> > draft-duke-tsvwg-ecn-aggregating-tunnels/
> >
> > I am not sure what this means:
> >
> > "the ECN value from a congestion indicating packet should be the
> > source of the copied value."
> >
> > So if an ECT(0) and a CE packet are in the same outer packet, the
> > outer packet should be CE? But what if the inner CE packet was
> > originally ECT(1) and this is an indication of minor congestion? Then
> > the ECT(0) will be marked CE on egress and execute a loss response,
> > which is inappropriate, even if there is no congestion whatsoever on
> > the tunnel path.
> >
> > Or is the copied value on tunnel egress? Both?
> >
> > The old language, IIRC, was just to make the outer packet Not-ECT.
> > This doesn't send spurious signals to the endpoints, and the only
> > drawback is that the tunnel has to do a packet drop instead of using
> > an ECN mark. As CBR is the preferred mode of operation here, it seems
> > like this is a small price to pay. To summarize:
> >
> > 1) If my draft were even half-baked, it would be the best advice to
> > include
> > 2) Since it is not baked, I think Not-ECT (6040 "compatibility mode")
> > is the best advice
> > 3) The current text, IMO, is a bit ambigous, and will result in
> > pathological behavior.
>
> I agree that compatibility mode is thing to do here, and here is the new
> text:
>
>[[RFC3168]] and [[RFC4301]], updated by [[RFC6040]] defines behaviors
> for marking
>the outer ECN field value based on the ECN field of the inner packet.
>As AGGFRAG mode may have multiple inner packets present in a single
>outer packet, and there is no obvious correct way to map these
>multiple values to the single outer packet ECN field value, the
>tunnel ingress endpoint SHOULD operate in the "compatibility" mode
>rather than the "default" mode from RFC6040. In particular this means
>that the ingress (sending) endpoint of the tunnel always sets the
>newly constructed outer encapsulating packet header ECN field
>to Not-ECT [[RFC6040]].
>
> We have a couple more ADs with ECN as a DISCUSS:
>
> - Lars - You wanted us to be explicit about what to do with ECN field
> based on RFC6040. The propsed text above satisfies this requirement I
> beleive. Agreed?
>
> - Zaheduzzaman - You added a +1 to Lars' DISCUSS for ECN. Would you also
> be satisfied with the above text?
>
> Thanks,
> Chris.
>
> > Martin
> >
> > On Wed, Aug 24, 2022 at 5:46 AM Christian Hopps 
> > wrote:
> >
> >
> > Christian Hopps  writes:
> >
> > >> On Aug 24, 2022, at 04:28, Lars Eggert 
> > wrote:
> > >>
> >  ### Section 3.1, paragraph 0
> >  ```
> >  3.1.  ECN Support
> >  ```
> >  There is a lot more nuance to this, as described in RC6040.
> > This document needs
> >  to follow that existing standard rather than define another
> > variant.
> > >>>
> > >>> We reference RFC3168 which talks directly to handling ECN
> > with IPsec security associations. We are not defining a new
> > variant. I see that RFC6040 updates the RFCs we reference so we
> > perhaps should add that reference here as well?
> > >>
> > >> It's not just adding the reference. RFC6040 specifies how ECN
> > applies to tunnels, including this tunnel, so it needs to be
> > followed here (or there needs to be a solid rationale/discussion
> > about which aspects are not being followed and why.)
> > >
> > > I've changed the ECN section text on marking to:
> >
> > [slight grammar fix]
> >
> >   [[RFC3168]] and [[RFC4301]] define behaviors for marking ECN
> > based on the
> >   ingress and egress of the inner packet. These RFCs were later
> > updated
> >   by [[RFC6040]]. The methods defined in [[RFC6040]] SHOULD be
> > followed with
> >   the addition that if multiple inner packets are being
> > encapsulated in
> >   an AGGFRAG mode outer packet, the ECN value from a congestion
> >   indicating packet should be the source of the copied value.
> >
> > Thanks,
> > Chris.
>
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Lars Eggert's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps


Martin Duke  writes:


I'm not sure we've landed on a good solution with the ECN text.  Two
weeks ago I pushed Christian to do something more sophisticated with
ECN, but realized that this is such a complicated subject that I
wrote a draft (which, to my knowledge, no one has read):

https://datatracker.ietf.org/doc/
draft-duke-tsvwg-ecn-aggregating-tunnels/

I am not sure what this means:

"the ECN value from a congestion indicating packet should be the
source of the copied value."

So if an ECT(0) and a CE packet are in the same outer packet, the
outer packet should be CE? But what if the inner CE packet was
originally ECT(1) and this is an indication of minor congestion? Then
the ECT(0) will be marked CE on egress and execute a loss response,
which is inappropriate, even if there is no congestion whatsoever on
the tunnel path.

Or is the copied value on tunnel egress? Both?

The old language, IIRC, was just to make the outer packet Not-ECT.
This doesn't send spurious signals to the endpoints, and the only
drawback is that the tunnel has to do a packet drop instead of using
an ECN mark. As CBR is the preferred mode of operation here, it seems
like this is a small price to pay. To summarize:

1) If my draft were even half-baked, it would be the best advice to
include
2) Since it is not baked, I think Not-ECT (6040 "compatibility mode")
is the best advice
3) The current text, IMO, is a bit ambigous, and will result in
pathological behavior.


I agree that compatibility mode is thing to do here, and here is the new text:

  [[RFC3168]] and [[RFC4301]], updated by [[RFC6040]] defines behaviors for 
marking
  the outer ECN field value based on the ECN field of the inner packet.
  As AGGFRAG mode may have multiple inner packets present in a single
  outer packet, and there is no obvious correct way to map these
  multiple values to the single outer packet ECN field value, the
  tunnel ingress endpoint SHOULD operate in the "compatibility" mode
  rather than the "default" mode from RFC6040. In particular this means
  that the ingress (sending) endpoint of the tunnel always sets the
  newly constructed outer encapsulating packet header ECN field
  to Not-ECT [[RFC6040]].

We have a couple more ADs with ECN as a DISCUSS:

- Lars - You wanted us to be explicit about what to do with ECN field based on 
RFC6040. The propsed text above satisfies this requirement I beleive. Agreed?

- Zaheduzzaman - You added a +1 to Lars' DISCUSS for ECN. Would you also be 
satisfied with the above text?

Thanks,
Chris.


Martin

On Wed, Aug 24, 2022 at 5:46 AM Christian Hopps 
wrote:


Christian Hopps  writes:

>> On Aug 24, 2022, at 04:28, Lars Eggert 
wrote:
>>
 ### Section 3.1, paragraph 0
 ```
 3.1.  ECN Support
 ```
 There is a lot more nuance to this, as described in RC6040.
This document needs
 to follow that existing standard rather than define another
variant.
>>>
>>> We reference RFC3168 which talks directly to handling ECN
with IPsec security associations. We are not defining a new
variant. I see that RFC6040 updates the RFCs we reference so we
perhaps should add that reference here as well?
>>
>> It's not just adding the reference. RFC6040 specifies how ECN
applies to tunnels, including this tunnel, so it needs to be
followed here (or there needs to be a solid rationale/discussion
about which aspects are not being followed and why.)
>
> I've changed the ECN section text on marking to:

[slight grammar fix]

  [[RFC3168]] and [[RFC4301]] define behaviors for marking ECN
based on the
  ingress and egress of the inner packet. These RFCs were later
updated
  by [[RFC6040]]. The methods defined in [[RFC6040]] SHOULD be
followed with
  the addition that if multiple inner packets are being
encapsulated in
  an AGGFRAG mode outer packet, the ECN value from a congestion
  indicating packet should be the source of the copied value.

Thanks,
Chris.




signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Lars Eggert's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Martin Duke
I'm not sure we've landed on a good solution with the ECN text.  Two weeks
ago I pushed Christian to do something more sophisticated with ECN, but
realized that this is such a complicated subject that I wrote a draft
(which, to my knowledge, no one has read):

https://datatracker.ietf.org/doc/draft-duke-tsvwg-ecn-aggregating-tunnels/

I am not sure what this means:

"the ECN value from a congestion indicating packet should be the source of
the copied value."

So if an ECT(0) and a CE packet are in the same outer packet, the outer
packet should be CE? But what if the inner CE packet was originally ECT(1)
and this is an indication of minor congestion? Then the ECT(0) will be
marked CE on egress and execute a loss response, which is inappropriate,
even if there is no congestion whatsoever on the tunnel path.

Or is the copied value on tunnel egress? Both?

The old language, IIRC, was just to make the outer packet Not-ECT. This
doesn't send spurious signals to the endpoints, and the only drawback is
that the tunnel has to do a packet drop instead of using an ECN mark. As
CBR is the preferred mode of operation here, it seems like this is a small
price to pay. To summarize:

1) If my draft were even half-baked, it would be the best advice to include
2) Since it is not baked, I think Not-ECT (6040 "compatibility mode") is
the best advice
3) The current text, IMO, is a bit ambigous, and will result in
pathological behavior.

Martin

On Wed, Aug 24, 2022 at 5:46 AM Christian Hopps  wrote:

>
> Christian Hopps  writes:
>
> >> On Aug 24, 2022, at 04:28, Lars Eggert  wrote:
> >>
>  ### Section 3.1, paragraph 0
>  ```
>  3.1.  ECN Support
>  ```
>  There is a lot more nuance to this, as described in RC6040. This
> document needs
>  to follow that existing standard rather than define another variant.
> >>>
> >>> We reference RFC3168 which talks directly to handling ECN with IPsec
> security associations. We are not defining a new variant. I see that
> RFC6040 updates the RFCs we reference so we perhaps should add that
> reference here as well?
> >>
> >> It's not just adding the reference. RFC6040 specifies how ECN applies
> to tunnels, including this tunnel, so it needs to be followed here (or
> there needs to be a solid rationale/discussion about which aspects are not
> being followed and why.)
> >
> > I've changed the ECN section text on marking to:
>
> [slight grammar fix]
>
>   [[RFC3168]] and [[RFC4301]] define behaviors for marking ECN based on the
>   ingress and egress of the inner packet. These RFCs were later updated
>   by [[RFC6040]]. The methods defined in [[RFC6040]] SHOULD be followed
> with
>   the addition that if multiple inner packets are being encapsulated in
>   an AGGFRAG mode outer packet, the ECN value from a congestion
>   indicating packet should be the source of the copied value.
>
> Thanks,
> Chris.
>
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Paul Wouters
Indeed, they was the conclusion of the transport area at the time. I would also 
prefer we could stick with that better solution, but more importantly I don’t 
want this document stopped by a DISCUSS on either side of this argument.

Paul

Sent using a virtual keyboard on a phone

> On Aug 25, 2022, at 12:28, Michael Richardson  wrote:
> 
> 
>> On Aug 25, 2022, at 00:52, Erik Kline  wrote:
>> I think this document needs to request a protocol number from IANA.
> 
> Erik, the WG had this debate at length two+ years ago.
> 
> I feel that the WG, through our AD, asked the IESG and the IntArea and
> Transport Area this specific question in a number of different ways to be 
> sure.
> 
> We decided not to go that way because we felt that it was a waste of a very
> scarce resource.
> 
> --
> Michael Richardson. o O ( IPv6 IøT consulting )
>   Sandelman Software Works Inc, Ottawa and Worldwide
> 
> 
> 
> 
> ___
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec


signature.asc
Description: Binary data
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Michael Richardson

On Aug 25, 2022, at 00:52, Erik Kline  wrote:
> I think this document needs to request a protocol number from IANA.

Erik, the WG had this debate at length two+ years ago.

I feel that the WG, through our AD, asked the IESG and the IntArea and
Transport Area this specific question in a number of different ways to be sure.

We decided not to go that way because we felt that it was a waste of a very
scarce resource.

--
Michael Richardson. o O ( IPv6 IøT consulting )
   Sandelman Software Works Inc, Ottawa and Worldwide






signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] John Scudder's No Objection on draft-ietf-ipsecme-iptfs-17: (with COMMENT)

2022-08-25 Thread Christian Hopps


John Scudder via Datatracker  writes:

--
COMMENT:
--

Nit:

I just happened to notice this bit in the Intro:

"While directly
   obscuring the data with encryption [RFC4303], fully"

There seem to be words missing before "fully"?


This text was suggested during earlier review; however, I can no longer find it. I've now 
removed ", fully" for the next revision.

Thanks,
Chris.



signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] I-D Action: draft-ietf-ipsecme-iptfs-18.txt

2022-08-25 Thread internet-drafts


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the IP Security Maintenance and Extensions WG of 
the IETF.

Title   : IP-TFS: Aggregation and Fragmentation Mode for ESP 
and its Use for IP Traffic Flow Security
Author  : Christian Hopps
  Filename: draft-ietf-ipsecme-iptfs-18.txt
  Pages   : 36
  Date: 2022-08-25

Abstract:
   This document describes a mechanism for aggregation and fragmentation
   of IP packets when they are being encapsulated in ESP payloads.  This
   new payload type can be used for various purposes such as decreasing
   encapsulation overhead for small IP packets; however, the focus in
   this document is to enhance IPsec traffic flow security (IP-TFS) by
   adding Traffic Flow Confidentiality (TFC) to encrypted IP
   encapsulated traffic.  TFC is provided by obscuring the size and
   frequency of IP traffic using a fixed-sized, constant-send-rate IPsec
   tunnel.  The solution allows for congestion control as well as non-
   constant send-rate usage.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-iptfs-18

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-18


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Murray Kucherawy's No Objection on draft-ietf-ipsecme-iptfs-17: (with COMMENT)

2022-08-25 Thread Murray Kucherawy via Datatracker
Murray Kucherawy has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
COMMENT:
--

The first question of the shepherd writeup was not completely answered. 
Question 18, which is particularly relevant here, was not answered at all.

Section 7.1 creates an IANA registry with "Expert Review" rules.  Of such a
registry, Section 4.5 of RFC 8126 says, among other things:

   The required documentation and review criteria, giving clear guidance
   to the designated expert, should be provided when defining the
   registry.

This document doesn't do so.  After discussion, I'm told this is typical for
IPSec registries; it's just understood that whoever might be assigned as a DE
for this new registry will have the knowledge, context, and vision to do a good
job.  I have some broad concerns about how much our succession planning in
general needs improvement, and I think this sort of thing is one aspect of that
problem.  I urge the WG and the AD to give this some more thought.

Thanks for including Section 8.  This is always helpful to read.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Murray S. Kucherawy
On Thu, Aug 25, 2022 at 2:24 AM Tero Kivinen  wrote:

> Murray Kucherawy via Datatracker writes:
> > --
> > DISCUSS:
> > --
> >
> > Section 7.1 creates an IANA registry with "Expert Review" rules.  Of
> such a
> > registry, Section 4.5 of RFC 8126 says, among other things:
> >
> >The required documentation and review criteria, giving clear guidance
> >to the designated expert, should be provided when defining the
> >registry.
> >
> > This document doesn't do so.  Is that guidance available somewhere else,
> or
> > should some be added here?
>
> This is common in the IPsec documents. The working group has assumed
> that experts are experts and they know what to do without being
> explictly instructed to do so
>
> As an IANA Expert for most of the IPsec related registries, I hope
> that I have been able to do that job in a such way that other people
> have found that good enough (at least I have not heard complains about
> that).
>
> [...]
>

This posture worries me.  I've no doubt that you're doing a fine job as the
DE for the registries for which you're responsible, probably because you
were around during IPSec's development.  But what about your successor(s)?
Will they have all of the context, background, and vision you have in order
to continue where you eventually leave off?

The IETF, I'm coming to believe, has generally not done a good enough job
of succession planning.  This is one place where we can shore up that
problem.

I'll clear my DISCUSS, but I urge the working group and sponsoring AD to
give this some more thought.

-MSK
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Warren Kumari's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Warren Kumari via Datatracker
Warren Kumari has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
DISCUSS:
--

[ Chat with Christian Hopps on the telechat -- I explained my concerns and
Christian will add some text around how to deploy this safely / some background
context. Even if you are the network admin and in complete control of the
network, having some "here are some things to keep in mind when deploying, like
that that will ALWAYS use the configured bandwidth so make sure you will always
have that free during failures and congestion and things like that..." type
warnings are helpful. ]

Clearing my discuss.


--
COMMENT:
--

Much thanks to Bo Wu for the OpsDir review, and to the authors for addressing /
incorporating the comments.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] John Scudder's No Objection on draft-ietf-ipsecme-iptfs-17: (with COMMENT)

2022-08-25 Thread John Scudder via Datatracker
John Scudder has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
COMMENT:
--

Nit:

I just happened to notice this bit in the Intro:

"While directly
   obscuring the data with encryption [RFC4303], fully"

There seem to be words missing before "fully"?



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Zaheduzzaman Sarker's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps


Hi Zaheduzzaman,

[inline]

Zaheduzzaman Sarker via Datatracker  writes:


Zaheduzzaman Sarker has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
DISCUSS:
--

Thanks for working on this specification. I found this spec to be a mix of
transport and non-transport related topics and had to think a bit more due to
lack of rational behind choices made.

I would like to discuss - why there is no normative text (MUST/MUST NOT) for
non-congestion controlled mode over operation in this specification that
prohibits the use of non-congestion controlled mode out side of controlled
environment?


Indeed, the suggested text we offered to add was:

 "This MUST NOT be used when full admin control over the network cannot be 
assured."


I am also supporting Lars's discuss on 3.1 ECN support.


This 2nd paragraph was added to satisfy this DISCUSS, please see the latest 
version:

https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-iptfs-17#section-3.1

Thanks,
Chris.


signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Zaheduzzaman Sarker's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Zaheduzzaman Sarker via Datatracker
Zaheduzzaman Sarker has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
DISCUSS:
--

Thanks for working on this specification. I found this spec to be a mix of
transport and non-transport related topics and had to think a bit more due to
lack of rational behind choices made.

I would like to discuss - why there is no normative text (MUST/MUST NOT) for
non-congestion controlled mode over operation in this specification that
prohibits the use of non-congestion controlled mode out side of controlled
environment?

I am also supporting Lars's discuss on 3.1 ECN support.


--
COMMENT:
--

The version of this specification changed quite frequently during the telechat
review period, hence I am mentioning that I am reviewing the -17th version of
this specification.

I have following comments, which I believe will improve the specification if
properly addressed -

# Section 2.4: I would like to have rational behind the two mode of operations.
what are the pros and cons and when would an implementer select one over
another? if this is written somewhere else then having a point would be great
benefit.

# Section 2.4.1: I believe the assumption here is that the network is fully
provisioned and no congestion related loss should occur hence here would not
need to react to any loss. what would be source of the potential loss then?
link failure only? if the loss is due to underestimation of bandwidth then 8084
need to be implemented as a last resort. It actually talks about circuit
breakers in section 2.4.2.1 and somehow managed to say in addition to
congestion control, the implementation that support non-congestion control mode
should implement circuit breaker. This is where I am a bit lost, why is this
written in section 2.4.2.1 and not in 2.4.1? is this the assumption that the
implementation that have non-congestion control mode would not have congestion
control mode?

The failure correction due to the expected bandwidth under, where loss seems to
be an indication, seems like a serious matter and but still there is no
normative language requirements on the reporting the loss. I wonder how useful
this could be.

The last line actually makes me more confused. If ESP over TCP is in use then
TCP would trigger the congestion control, thus this becomes a congestion
controlled case and yes, you can then perhaps send out packets without thinking
about congestion collapse. But then the assumption changes, then it becomes the
case IP-TFS is expected to run over a congestion controlled transport. however,
that is not the general assumption for the whole non-congestion controlled mode
of operation. Here, I think we need to clarify a bit more on how to interpret
the non-congestion controlled mode description.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Warren Kumari's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps


Lars Eggert  writes:


Sorry for the top post.

The text below is not sufficient. 8084 gives guidance on how to specify a CB , 
but doesn’t itself specify a solution that can just be pointed to. This 
document needs to define how, based on the guidance in 8084, a CB should be 
implemented for this specific protocol.


Hi Lars,

That was not required of pseudowires, I'm wondering why we are different here.

We do in fact indicate that congestion reports should be enabled when 
implementing a circuit breaker to provide the sender with the RFC8084 required 
information.

How sophisticated a vendor makes their circuit breakers (e.g., the types of 
controls they offer to the user etc), is a method of market differentiation. 
Normally IETF does not limit this unless it is required for protocol 
interoperability.

If you're requiring that we give an example of a simple CB implementation for 
vendors incapable of figuring this out (I'm not sure how they managed to 
implement the rest of the protocol w/o being able to do this but anyway..)? I 
can add the following text if it will clear the DISCUSS.

  One example of a simple slow-trip circuit breaker (CB) an
  implementation may provide would utilize 2 values, the amount
  of persistent loss rate required to trip the CB and the
  required length of time this persistent loss rate must be seen
  to trip the CB. These 2 value are required configuration from
  the user. When the CB is tripped the tunnel traffic is disabled,
  and an appropriate log message or other management type
  alarm is triggered indicating operate intervention is required.

Thanks,
Chris.


signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Tero Kivinen
Murray Kucherawy via Datatracker writes:
> --
> DISCUSS:
> --
> 
> Section 7.1 creates an IANA registry with "Expert Review" rules.  Of such a
> registry, Section 4.5 of RFC 8126 says, among other things:
> 
>The required documentation and review criteria, giving clear guidance
>to the designated expert, should be provided when defining the
>registry.
> 
> This document doesn't do so.  Is that guidance available somewhere else, or
> should some be added here?

This is common in the IPsec documents. The working group has assumed
that experts are experts and they know what to do without being
explictly instructed to do so

As an IANA Expert for most of the IPsec related registries, I hope
that I have been able to do that job in a such way that other people
have found that good enough (at least I have not heard complains about
that).

For example the IKEv2 registries created in RFC4306
(https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml)
are all expert review and the RFC4306 gave following instructions:

--
6.  IANA Considerations

   This document defines a number of new field types and values where
   future assignments will be managed by the IANA.

   The following registries have been created by the IANA:

  IKEv2 Exchange Types (section 3.1)
  IKEv2 Payload Types (section 3.2)
  IKEv2 Transform Types (section 3.3.2)
  IKEv2 Transform Attribute Types (section 3.3.2)
  IKEv2 Encryption Transform IDs (section 3.3.2)
  IKEv2 Pseudo-random Function Transform IDs (section 3.3.2)
  IKEv2 Integrity Algorithm Transform IDs (section 3.3.2)
  IKEv2 Diffie-Hellman Transform IDs (section 3.3.2)
  IKEv2 Identification Payload ID Types (section 3.5)
  IKEv2 Certificate Encodings (section 3.6)
  IKEv2 Authentication Method (section 3.8)
  IKEv2 Notify Message Types (section 3.10.1)
  IKEv2 Notification IPCOMP Transform IDs (section 3.10.1)
  IKEv2 Security Protocol Identifiers (section 3.3.1)
  IKEv2 Traffic Selector Types (section 3.13.1)
  IKEv2 Configuration Payload CFG Types (section 3.15)
  IKEv2 Configuration Payload Attribute Types (section 3.15.1)

   Note: When creating a new Transform Type, a new registry for it must
   be created.

   Changes and additions to any of those registries are by expert
   review.
--
(i.e., that is full IANA considerations section).
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Tero Kivinen
Erik Kline writes:
> 
>  
> 
> > I.e., either this document needs to formally update RFC 4303 by allowing
> any
> > number or another IP protocol number must be requested to the IANA.
>
> As I pointed out in my previous email that is not the case.
>
> The RFC4303 ESP has a Next Header field which contains indicates what
> type of packet is inside the ESP packet. It typically contains IP
> Protocol Numbers, but not always. Thats why the RFC4303 above says
> "chosen from the set of IP Protocol Numbers".
> 
> I disagree.  4303 S2.6 is very clearly talking about the Protocol Numbers
> registry (the example of "41 means IPv6" is one of the things that give it
> away).

Note that IP Protocol value 41 for ESP does NOT MEAN same thing than
what is described in the RFC 2473. The payload format of the ESP is
different than what is described in that RFC. ESP Tunnel mode adds
other pieces to the packet in different locations.

The reason 41 (and 4) where chosen to match the ESP Tunnel mode is
because they do have similar use than ESP Tunnel mode, but the actual
protocols are different. 

> I think this document needs to request a protocol number from IANA.

That would be one option, but then there might be issues where
someone actually tries to use this outside the ESP, and because the
current specification requires things to be negotiated in the IKEv2,
this is not really possible, and using this outside ESP will also
break the traffic flow confidentiality completely as there is no
encryption of the traffic.

We could also say that if the USE_AGGFRAG is negotiated for the Child
SA (ESP SA) then Next header field is ignored on recipient, and sent
as zeros, and all packets inside the Child SA are going to use
AGGFRAG_PAYLOAD format. We do loose some information that would be
helpful when debugging configuration issues, but the protocol would
still work. It would also made it harder to do future enhancements to
this protocol.
-- 
kivi...@iki.fi

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps



Murray Kucherawy via Datatracker  writes:


--
DISCUSS:
--

Section 7.1 creates an IANA registry with "Expert Review" rules.  Of such a
registry, Section 4.5 of RFC 8126 says, among other things:

   The required documentation and review criteria, giving clear guidance
   to the designated expert, should be provided when defining the
   registry.

This document doesn't do so.  Is that guidance available somewhere else, or
should some be added here?


Hi Murray,

This came up during the AD review. Here was the supplied answer:


** Section 7.1.  To double check, there is no more guidance to provide to the 
expert reviewer?


It's pretty wide open what sub-type might be used in the future (could even be 
completely different payload encapsulations/uses etc), so we didn't see a 
reason to limit/guide the experts anymore here.

Thanks,
Chris.

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Warren Kumari's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Lars Eggert
Sorry for the top post.

The text below is not sufficient. 8084 gives guidance on how to specify a CB , 
but doesn’t itself specify a solution that can just be pointed to. This 
document needs to define how, based on the guidance in 8084, a CB should be 
implemented for this specific protocol.

-- 
Sent from a mobile device; please excuse typos.

> On Aug 25, 2022, at 03:28, Christian Hopps  wrote:
> 
> 2.4.2.1.  Circuit Breakers
> 
>  In additional to congestion control, implementations that support
>  non-congestion control mode SHOULD implement circuit breakers
>  [RFC8084] as a recovery method of last resort.  When circuit breakers
>  are enabled an implementation SHOULD also enable congestion control
>  reports so that circuit breakers have information to act on.

___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Murray Kucherawy's Discuss on draft-ietf-ipsecme-iptfs-17: (with DISCUSS and COMMENT)

2022-08-25 Thread Murray Kucherawy via Datatracker
Murray Kucherawy has entered the following ballot position for
draft-ietf-ipsecme-iptfs-17: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/



--
DISCUSS:
--

Section 7.1 creates an IANA registry with "Expert Review" rules.  Of such a
registry, Section 4.5 of RFC 8126 says, among other things:

   The required documentation and review criteria, giving clear guidance
   to the designated expert, should be provided when defining the
   registry.

This document doesn't do so.  Is that guidance available somewhere else, or
should some be added here?


--
COMMENT:
--

The first question of the shepherd writeup was not completely answered. 
Question 18, which is particularly relevant here, was not answered at all.

Thanks for including Section 8.  This is always helpful to read.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


[IPsec] Murray Kucherawy's No Objection on draft-ietf-ipsecme-yang-iptfs-09: (with COMMENT)

2022-08-25 Thread Murray Kucherawy via Datatracker
Murray Kucherawy has entered the following ballot position for
draft-ietf-ipsecme-yang-iptfs-09: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ipsecme-yang-iptfs/



--
COMMENT:
--

The first question of the shepherd writeup was not completely answered.

Do you need BCP 14 (Section 1.1) at all?  You don't seem to use it anywhere.



___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps


Christian Hopps  writes:


[[PGP Signed Part:Good signature from 2E1D830ED7B83025 Christian Hopps 
 (trust ultimate) created at 2022-08-25T02:18:48-0400 using 
RSA]]

"Eric Vyncke (evyncke)"  writes:


Chris,

The -17 version indeed addresses one of the 4 DISCUSS points, namely the hop 
limit vs. TTL. Thank you for this.

I am far from being convinced that the added text about ICMP handling is rock
solid though. While I cannot point a specific issue, I fear that aggregating and
fragmenting inner packets and receiving one ICMP on the outer packet is not so
trivial and some actual guidance based on actual testing would be welcome. This
is 'unknown territory' AFAIK (no other aggr/frag tunnels over IP were
specified/deployed before) and for a 'standards track' I-D, we need more
guidance.


There's nothing too scary here.

- inner packet ICMP is completely independent of the IPsec tunnel, its just 
more inner traffic.


This was perhaps too simple a description of what is happening. RFC4301 does 
have text relating to the transiting of ICMP traffic through an SA, but these 
are policies about whether to allow the traffic through the SA or not. Inner 
ICMP traffic is not being processed to have an affect on the SA/tunnel or not.

Thanks,
Chris.


- outer packet ICMP is addressing the same singular ESP packets it always has. 
It is related to things like the size of the outer packet (PMTU) or the 
destination of the outer packet, etc. This is unaffected by what is 
encapsulated inside the ESP packet.

Thus it is enough to refer back to RFC4301 here -- it really does cover all the 
cases.

FWIW when one is implementing IP-TFS all the ICMP receive mechanics have 
already occurred prior to you being handed your AGGFRAG payload to act on.

Thanks,
Chris.



The DISCUSS on the next header still holds of course. As I suggested, either 
update RFC 4303/8200 or request an IP protocol number.

Regards

-éric


On 24/08/2022, 18:49, "iesg on behalf of Christian Hopps"  wrote:


Éric Vyncke via Datatracker  writes:
> --
> DISCUSS:
> --
>
> ## DISCUSS
>
> ### Section 2.2.6
>
> Please also mention hop-limit and RFC 8200.
>
> ### Absence of ICMP considerations
>
> Should there be an equivalent of section 6 of RFC 4301 about ICMP ? As 
several
> unprotected packets can be bundled together, some guidance to the 
implementers
> will be welcome.

The section has been modified to address these concerns:

  *** IPv4 Time-To-Live (TTL), IPv6 Hop Limit, and Tunnel errors

  [[RFC4301]] specifies how to modify the inner packet IPv4 TTL [[RFC0791]] 
or
  IPv6 Hop Limit [[RFC8200]].

  Any errors (e.g., ICMP errors) are handled the same as with
  non-AGGFRAG IPsec tunnels. This applies to both the outer traffic as
  well as the inner traffic prior to it entering the tunnel, see
  [[RFC4301]].

I believe this should cover the rest of the items left in this DISCUSS 
ballot.

Thanks,
Chris.


[[End of PGP Signed Part]]




signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec


Re: [IPsec] Éric Vyncke's Discuss on draft-ietf-ipsecme-iptfs-14: (with DISCUSS and COMMENT)

2022-08-25 Thread Christian Hopps


"Eric Vyncke (evyncke)"  writes:


Chris,

The -17 version indeed addresses one of the 4 DISCUSS points, namely the hop 
limit vs. TTL. Thank you for this.

I am far from being convinced that the added text about ICMP handling is rock
solid though. While I cannot point a specific issue, I fear that aggregating and
fragmenting inner packets and receiving one ICMP on the outer packet is not so
trivial and some actual guidance based on actual testing would be welcome. This
is 'unknown territory' AFAIK (no other aggr/frag tunnels over IP were
specified/deployed before) and for a 'standards track' I-D, we need more
guidance.


There's nothing too scary here.

- inner packet ICMP is completely independent of the IPsec tunnel, its just 
more inner traffic.
- outer packet ICMP is addressing the same singular ESP packets it always has. 
It is related to things like the size of the outer packet (PMTU) or the 
destination of the outer packet, etc. This is unaffected by what is 
encapsulated inside the ESP packet.

Thus it is enough to refer back to RFC4301 here -- it really does cover all the 
cases.

FWIW when one is implementing IP-TFS all the ICMP receive mechanics have 
already occurred prior to you being handed your AGGFRAG payload to act on.

Thanks,
Chris.



The DISCUSS on the next header still holds of course. As I suggested, either 
update RFC 4303/8200 or request an IP protocol number.

Regards

-éric


On 24/08/2022, 18:49, "iesg on behalf of Christian Hopps"  wrote:


Éric Vyncke via Datatracker  writes:
> --
> DISCUSS:
> --
>
> ## DISCUSS
>
> ### Section 2.2.6
>
> Please also mention hop-limit and RFC 8200.
>
> ### Absence of ICMP considerations
>
> Should there be an equivalent of section 6 of RFC 4301 about ICMP ? As 
several
> unprotected packets can be bundled together, some guidance to the 
implementers
> will be welcome.

The section has been modified to address these concerns:

  *** IPv4 Time-To-Live (TTL), IPv6 Hop Limit, and Tunnel errors

  [[RFC4301]] specifies how to modify the inner packet IPv4 TTL [[RFC0791]] 
or
  IPv6 Hop Limit [[RFC8200]].

  Any errors (e.g., ICMP errors) are handled the same as with
  non-AGGFRAG IPsec tunnels. This applies to both the outer traffic as
  well as the inner traffic prior to it entering the tunnel, see
  [[RFC4301]].

I believe this should cover the rest of the items left in this DISCUSS 
ballot.

Thanks,
Chris.




signature.asc
Description: PGP signature
___
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec