Hi,
a couple of comments. I think that the profile is generally OK, but it seems to me that a few issues persist. 1. The Certificate Encoding "PKCS #7 wrapped X.509 certificate" (1) MUST be supported. See [IKEV2IANA] for this and other IANA IKEv2 parameter names used in this text. “PKCS #7 wrapped X.509 certificate” certificate encoding is deprecated and is not used in IKEv2 (see https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml#ikev2-parameters-11). Generally, I see no need for the text that imposes requirements on certificate encoding at all – we never run into the interoperability problems with this? as far as I remember. I suggest to remove this text. 2. If certificate chains are used, all intermediate certificates up to, and including the locally provisioned trust anchor certificate MUST be signaled. See Section 6.10.7 for the sub-CA example in which certificate chains are used. This is confusing. I read this text as the “MUST” is imposed only if “certificate chains are used”. Does it mean that implementations may skip this “MUST” if EE certificate is directly signed by CA certificate and there is no intermediate certificates? Or is it still a chain and “if” is relevant to the case when there is no CA and there is a direct trust to EE certificates (in which case PKI is not needed at all and you can use RAW public keys)? Another point: trust anchors certificates usually are not included in CERT payload in IKEv2. I see draft’s a reasoning that this inclusion would allow better network debugging, but I’m not sure I can buy this argument. Probably more detailed explanation is needed. 3. IKEv2 authentication MUST use authentication method 14 ("Digital Signature") for ACP certificates; this authentication method can be used with both RSA and ECDSA certificates, as indicated by a PKIX- style OID. I think it’s better to rephrase this more accurately: “indicated by an ASN.1 object AlgorithmIdentifier” (which may include parameters besides OID). A typo in the title of 6.7.1.1.2.: s/RFC847/RFC8247 Regards, Valery. From: IPsec [mailto:ipsec-boun...@ietf.org] On Behalf Of Yoav Nir Sent: Tuesday, February 25, 2020 11:18 PM To: Toerless Eckert Cc: ipsec@ietf.org WG; Michael Richardson; draft-ietf-anima-autonomic-control-pl...@ietf.org Subject: Re: [IPsec] IPsec profile feedback wanted (draft autonomic control plane) Hi, Toerless. I trimmed below most of your background info. On 24 Feb 2020, at 21:50, Toerless Eckert <t...@cs.fau.de> wrote: [hope its fine to cross-post ipsec and ipsecme given how one is concluded, but may have more long-time subscribers] ipsec is this group’s mailing list. I don’t know that there even is an ipse...@ietf.org We're looking for opinions about an IPsec profile for "Autonomic Control Plane" draft-ietf-anima-autonomic-control-plane, or specifically 6.7.1.1.1 of: https://raw.githubusercontent.com/anima-wg/autonomic-control-plane/be056679b9c9cac8c2d664958a3b91585b010a83/draft-ietf-anima-autonomic-control-plane/draft-ietf-anima-autonomic-control-plane.txt Quick background so you do not need to read anything more than 6.7.1.1.1: I read a little more. Hope you don’t mind. The profile seems fine to me. There is one thing that I think is missing. The profile specifies that the ACP nodes should use tunnel mode (when GRE is not used), because: IPsec tunnel mode is required because the ACP will route/forward packets received from any other ACP node across the ACP secure channels, and not only its own generated ACP packets. With IPsec transport mode, it would only be possible to send packets originated by the ACP node itself. OK. When IKEv2 is used to negotiate tunnel-mode SAs (and transport mode, but that’s not important here) they need an IPsec policy that specifies traffic selectors so that IKEv2 can specify traffic selectors. Nowhere in your draft do I see a specification of what traffic selectors need to be negotiated. If I understand the above paragraph correctly, both the source of the packet and the destination can be the IP address of any ACP node, neither of which are required to be the tunnel endpoints. This implies some sort of generic traffic selector. The draft should specify this, IMO Yoav
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec