Hi Med, Yoav, all,

On Wed, Jul 29, 2020 at 05:38:17AM +0000, mohamed.boucad...@orange.com wrote:
> Hi Yoav, Ben, all,
> 
> ==
> Ben (AD): (missed first point Belongs in ADD?) Slide with attribute format, 
> for DoH, need to provide URI template

FWIW, the first point was not quite "belongs in ADD" but more "ADD is doing
a lot of similar-ish stuff; let's stay informed of what's going on, in both
directions".

> Valery: Presentation also requested in ADD, but didn't have room in agenda. 
> Re: URI, will be covered in DoH clarifications (?)
> ==
> 
> Valery was referring to 
> https://tools.ietf.org/html/draft-btw-add-rfc8484-clarification-02#section-6.1
>  where we define a well-known uri that will be used to retrieve the uri 
> templates directly from the discovered Encrypted server. We that approach, we 
> don't need to supply the URI template in the IKE attribute.

Ah, thanks; I hadn't encountered that one yet.

-Ben

> Cheers,
> Med
> 
> De : IPsec [mailto:ipsec-boun...@ietf.org] De la part de Yoav Nir
> Envoyé : mardi 28 juillet 2020 22:22
> À : Tero Kivinen <kivi...@iki.fi>
> Cc : ipsec@ietf.org
> Objet : Re: [IPsec] Preliminary minutes from the IETF 108 IPsecME WG Meeting
> 
> Hi.
> 
> I uploaded a PDF version to the meeting materials. Also added a list of 
> action items for the chairs.  Comments are welcome on that part as well.
> 
> https://www.ietf.org/proceedings/108/minutes/minutes-108-ipsecme-00
> 
> Yoav
> 
> 
> On 28 Jul 2020, at 16:15, Tero Kivinen 
> <kivi...@iki.fi<mailto:kivi...@iki..fi>> wrote:
> 
> Here is preliminary minues from the IETF 108 IPsecME WG meeting. I
> copied some discussion about the proposed changes to ESP from Jabber
> to here, as I think it was important to record those even when we did
> not have time to have comments during the meeting.
> 
> If you have any comments, please send them to me as soon as possible.
> ----------------------------------------------------------------------
> # IPsecME IETF 108
> 
> Time: Tuesday, 28-Jul-2020, at 11:00-12:40 UTC
> 
> ## Agenda:
> * 11:00-11:05 - Note Well, technical difficulties and agenda bashing
> * 11:05-11:10 - Document status (chairs)
> * 11:10-11:25 - draft-smyslov-ipsecme-rfc8229bis (Valery/Tommy)
> * 11:25-11:35 - draft-btw-add-ipsecme-ike-00 (Valery)
> * 11:35-11:45 - draft-smyslov-ipsecme-ikev2-auth-announce (Valery)
> * 11:45-12:00 - Proposed improvements to ESP (Michael Rossberg)
> * 12:00-12:15 - IPTFS (Christian Hopps)
> * 12:15-12:30 - YANG model for IPTFS (Christian Hopps)
> * 12:30-12:40 - AOB + Open Mic
> 
> ### Note Well, technical difficulties and agenda bashing
> *Chairs* (5min)
> 
> No Edits
> 
> ### Document status
> *chairs* (5min)
> 
> *-implicit-Iv published as RFC8750
> *-qr-ikev2 published as RFC8784
> 
> *-ipv6-ipv4-codes publication requested
> 
> ### draft-smyslov-ipsecme-rfc8229bis (TCP encap of IKE/IPsec)
> *Valery/Tommy* (15min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-rfc8229bis-00
> 
> Paul Wouters: What are the kernel implications? And does this allow for 
> smaller IPsec/ESP Packets?
> Valery: Text is a bit short, TCP stream packets will have same class
> Paul: What Interop testing has been done?
> Valery: Tested with Apple, Cisco, libreswan
> 
> Piannissimo Hum for who has read the draft
> 
> Paul: Good idea to adopt, found issues that would be good to incorporate in 
> draft
> 
> Yoav: Will take to list if we need an update to 8229 and if this is the right 
> starting point.
> 
> ### draft-btw-add-ipsecme-ike-00 (IKEv2 config for Encrypted DNS)
> *Valery* (10min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-ikev2-configuration-for-encrypted-dns-00
> 
> Paul: What to do outside of VPN tunnel seems out of scope? (regarding Scope 
> bit)
> 
> Valery: Still an interesting subject
> 
> Ben (AD): (missed first point Belongs in ADD?) Slide with attribute format, 
> for DoH, need to provide URI template
> 
> Valery: Presentation also requested in ADD, but didn't have room in agenda.  
> Re: URI, will be covered in DoH clarifications (?)
> 
> Ben: When DoQ arrives may need additional work
> 
> Tero: Add configuration attributes, less internal strucutre, more higher 
> level structure
> 
> Yoav (participant): Missing motivation from draft  Moving towards encrypted 
> world, don't want to force people to keep insecure DNS just for legacy IKEv2 
> server
> 
> Valery: That is one of the motivations; users won't see this, but it is 
> useful.
> 
> Tirumaleswar Reddy: URL can be discovered another way
> 
> Benedict Wong: My understanding is that in some cases we need a hostname to 
> do validation of the DoT server
> 
> Tirumaleswar: This only supports PKI-based verification, so we can verify 
> based on sent certificate.
> 
> Yoav: Calling for adoption?
> 
> Valery: ADD Primary target for adoption, ipsecme is just informational, if 
> there is interest it could persist in this WG, but not yet.
> 
> Tirumaleswar: Couple more revisions necessary, extension to IKE, want to make 
> sure both working groups are aware of work
> 
> Ben (AD): If ipsecme was concerned by the work, or on the other hand thinks 
> it makes sense, it's good information for ADD to have
> 
> ### draft-smyslov-ipsecme-ikev2-auth-announce
> *Valery* (10min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-announcing-supported-authentication-methods-in-ikev2-00
> 
> Paul: Good idea, unclear where complexity might be, in the past migration 
> between methods (null -> something else) needed a ppk hack - sending two auth 
> payloads
> 
> Tero (participant): Could have one part negotiate the algorithm, and the 
> second part to negotiate the algorithm ids for CAs in the certreq
> 
> Yoav: will take a call for adoption to the list
> 
> ### Proposed improvements to ESP
> *Michael Rossberg* (15min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-proposed-improvements-to-esp-01
> 
> Yoav (?): Discussion happening on list and in jabber.  Informational would be 
> wrong, changes packet on wire, so experimental or standards track if anything
> 
> Summary of questions and comments from the jabber:
> 
> * Yoav: Some firewalls would be very upset about this packet format, because 
> it looks like every packet is retransmission.
> * Paul: so flip sender/window id with sequence number
> * Chopps: andeven put the higher order after lower order so stays exactly the 
> same as before
> * Scott Fluhrer: In addition, each sending id/window id has its own replay 
> window, does that mean that the receiver needs to track 4 billion antireplay 
> windows?
> * Scott: Also, it wouldn't be secure with CBC
> * Paul: It drops all non-AEAD, which we should do anyways
> * Scott: You also lose the multitarget protection with GCM by not including 
> the 32 bits of key-derived nonce
> * chopps: The sender id is really a mcast thing, so it reduces to 64k
> * Scott: Does the receiver need to track a antireplay window for each 
> multicast sender?
> * Yaov: Yes
> * Scott: I can't see how that can work on a decryptor that can't dynamically 
> allocate memory
> * Bob Moskowitz: Would need a change to robust header compression so that 
> smaller seq# for constrained links?
> * Valery: This proposal lacks enough generality to replace ESP - it considers 
> very small set of ciphers and use cases
> * Paul: and we might as well throw in a discussion of implicit IV if we are 
> updating ESP to v4
> * Yoav: @Valery: doesn't it use all the ciphers that people care about now? 
> Consider that TLS 1.3 has about two ciphers (plus another 1 for IOT).
> * Valery: In addition, many things it aims for can be achieved using ESP. 
> Even replay protection for multicast (with some limitations).
> * Steffen Klassert: Get rid of the trailer would be nice from implementation 
> point of view
> * Valery: @yoav, No, it doesn't work with CBC at all. Moreover, if IV is 
> somehow structured, it won't work too
> * Yoav: TLS 1.3 doesn't support CBC either.
> * Valery: I understand, but what if tomorrow a new cipher mode appear that is 
> superior to GCM and will require some special form of IV? The problem is that 
> this design requires IV to be in a particular form. If cipher requires other 
> form, it'll fail
> 
> Tero: Not in charter, this is a big change.  See if it is a good idea first 
> before taking to much time discussing and writing
> 
> ### IPTFS -- 
> [draft-ietf-ipsecme-iptfs-01](https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-01)
> *Christian Hopps* (15min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-ip-traffic-flow-security-00
> 
> Yoav: Hasn't gotten much review, WGLC is one way, but don't know if it is the 
> best way. Requesting transport area early may be a good way too.
> 
> Tero: Might be hard to get another protocol number.
> 
> Lou: Getting a protocol number shouldn't be a big deal; many can be 
> deprecated.
> 
> Ben: Please fill out the official early-allocation form request.
> 
> Agreed on sending this out for transport area early review.
> 
> ### YANG model for IPTFS -- 
> [draft-fedyk-ipsecme-yang-iptfs-00](https://tools.ietf.org/html/draft-fedyk-ipsecme-yang-iptfs-00)
> *Christian Hopps* (15min)
> 
> Slides link: 
> https://www.ietf.org/proceedings/108/slides/slides-108-ipsecme-yang-model-for-ip-traffic-flow-security-00
> 
> Tero: SDN YANG models generally work in two mode, either IKE-less, where it 
> configures IPsec SAs, or in IKE mode where it does not touch IPsec SAs, as 
> IKE configures them, so they wanted to keep the configuration clear which 
> parts they are configuring.
> 
> Christian: Also operational state, even if not configured via YANG
> 
> Tero: If we could consolidate on a single YANG model, that would be ideal 
> (such as I2NFS)
> 
> Yoav: Per chat, would benefit from a YANG Dr. review
> 
> Lou: Would benefit from another review, per datatracker, latest draft needs 
> another review.
> 
> ### AOB + Open Mic
> *all* (10min)
> 
> Paul: Labeled IPsec still in review. Graveyard draft still in limbo
> 
> Tero: Take to list; a few of these can go to WGLC, but should check with AD 
> first.
> 
> Tero: I think we need to have interm meeting about the ESP. We cut the 
> discussion out from here, as it would have taken the rest of the time, but we 
> should have separate interm just for it.
> --
> kivi...@iki.fi<mailto:kivi...@iki.fi>
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org<mailto:IPsec@ietf.org>
> https://www.ietf.org/mailman/listinfo/ipsec
> 
> 
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations 
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu 
> ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou 
> falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged 
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete 
> this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been 
> modified, changed or falsified.
> Thank you.
> 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to