> On Oct 13, 2020, at 9:16 AM, Valery Smyslov <smyslov.i...@gmail.com> wrote:
> 
> Hi Lou,
> 
>> Valery,
>> 
>> Please see below.
>> 
>> On 10/13/2020 3:22 AM, Valery Smyslov wrote:
>>> Hi Chris,
>>> 
>>>> Hi ipsecme and chairs,
>>>> 
>>>> This is a small update to the IPTFS draft which incorporates the last 2 
>>>> changes that had been requested
>> over
>>>> the last year or so.
>>>> 
>>>> 1. As requested last year, it dispenses with the late-enabled 
>>>> functionality, replacing it with a SHOULD
>> clause
>>>> supporting receiving IPTFS encapsulated ESP payloads w/o extra 
>>>> configuration.
>>> I prefer this functionality to be removed. Either you are doing classical 
>>> tunnel/transport in the SA or you are
>> doing IPTFS.
>> 
>> I agree that there is added code complexity, but have you considered the
>> operational benefit of having this?  Specifically (a) adding yet another
>> required configuration parameter that must match at both ends to get an
>> ipsec tunnels up and (b) what it takes to go from an operational non-TFS
>> configuration to a TFS configuration in one or both directions?
> 
> I can't buy these arguments. Using IPTFS is negotiated in IKEv2 via
> exchange of USE_IPTFS notify (BTW, note a typo in Section 5.1 title: USE_TFS 
> instead of USE_IPTFS).
> So, unless you upgrade both ends and update configuration IPTFS won't be used 
> at all.
> Once you upgrade one end you can add a configuration parameter to it to
> propose using IPTFS while being initiator. Until the other end is upgraded 
> too,
> it will ignore the USE_IPTFS notify and SA will be established in tunnel mode.
> Once the other end is upgraded and its configuration is changed they
> will start using IPTFS.
> 
>>>> From my understanding it's just another encapsulation mode. Otherwise we 
>>>> have the following problems:
>>> - Since this functionality is optional its capability must be negotiated 
>>> (or indicated by the peers) in IKEv2.
>>>    And negotiation of IPTFS features is already complex enough.
>> 
>> I'm not sure what needs to be negotiated here -- without negotiation the
>> behavior is the same as would be seen with a miss-configured  endpoint
>> or mismatch in TFS config that will occur without the option.
> 
> Not true. If peers are misconfigured, then IPTFS won't be negotiated and SA 
> will be established in tunnel mode
> (if using IPTFS is optional for both) or not established at all (if using PFS 
> is mandatory for the peer suggesting it).
> On the contrary, if switching from tunnel to IPTFS on live SA is not 
> negotiated, and one of the peers doesn't
> support it, then when the other peer switches from tunnel mode to IPTFS on 
> live IPsec SA and starts sending
> IPTFS packets, then the first peer will most probably drop them. We'll get a 
> classical "black hole", and the worst
> thing that it won't be detected by liveness checks, since IKE SA will be 
> perfectly workable.
> 
>>> - It complicates processing in the kernel. E.g, it's not clear for me what 
>>> "on receipt of the first IP-TFS
>> payload" means.
>>>    If packets are reordered in the network and the first received IPTFS 
>>> packet is not the first sent IPTFS
>> packet?
>>>    What to do with the non-IPTFS packets sent before first IPTFS packet but 
>>> received after it? And so on.
>> 
>> This is an implementation choice, right?  Why not just drop it or
>> process it as the implementation sees fit?
> 
> Right, but it complicates processing. Currently I uniformly process all the 
> packets within window.
> Now I have to remember on which E(SN) the switching occured and process 
> previous
> packets as tunnel (or start dropping them) and subsequent packets as IPTFS.
> 
>>>    IPTFS processing in the kernel is already quite complex, let's not 
>>> introduce additional complexity.
>>> - I see no value in this functionality apart from the debugging and I don't 
>>> want debugging capability to
>>>    be present in the RFC, so that people, who really don't need it, 
>>> implement it in
>>>    their products introducing new bugs. You may argue, that you made it 
>>> optional, but SHOULD is very close
>>>    to MUST and in addition making it optional only complicates negotiation 
>>> of IPTFS.
>> 
>> My view is that the main benefit is simpler configuration and removing a
>> requirement for timing manual configuration changes at each end of a
>> tunnel.  Configuring IPsec is complex enough,  from the operational
>> perspective, I'd prefer to see this as a MUST, but can live with
>> SHOULD.  (IMO - Getting the code right once per implementation is
>> greatly outweighed by the returns in not having to impose more
>> configuration and configuration timing burdens.)
> 
> Please, see above. Since using IPTFS is negotiated, I see no simplification
> in configuring. You still need to upgrade and configure properly both ends
> before you can use it.

IPTFS is not always negotiated, as IKE is not always used. Supporting zero-conf 
IPTFS receive is very useful for supporting these non-IKE use-cases.

Thanks,
Chris.

> 
> If you badly need this feature, then please make it MAY and negotiable,
> so that people can ignore it. SHOULD is too strong for it,
> leaving it non-negotiable is just unacceptable, IMHO.
> 
> Regards,
> Valery.
> 
>> Thanks,
>> 
>> Lou
>> 
>>> So, please, remove it.
>>> 
>>>> 2. It highlights that one must send payloads that carry inner packet 
>>>> fragments using consecutive ESP
>>>> sequence numbered packets (with a caveat for all pad payload insertion).
>>> That's useful clarification, thanks.
>>> 
>>> Regards,
>>> Valery.
>>> 
>>>> We feel the document is quite stable at this point and would thus like to 
>>>> ask for moving to WG Last Call.
>>>> 
>>>> Thanks,
>>>> Chris.
>>>> 
>>>>> On Sep 30, 2020, at 12:25 PM, internet-dra...@ietf.org wrote:
>>>>> 
>>>>> 
>>>>> A New Internet-Draft is available from the on-line Internet-Drafts 
>>>>> directories.
>>>>> This draft is a work item of the IP Security Maintenance and Extensions 
>>>>> WG of the IETF.
>>>>> 
>>>>>        Title           : IP Traffic Flow Security
>>>>>        Author          : Christian Hopps
>>>>>   Filename        : draft-ietf-ipsecme-iptfs-02.txt
>>>>>   Pages           : 26
>>>>>   Date            : 2020-09-30
>>>>> 
>>>>> Abstract:
>>>>>   This document describes a mechanism to enhance IPsec traffic flow
>>>>>   security by adding traffic flow confidentiality to encrypted IP
>>>>>   encapsulated traffic.  Traffic flow confidentiality is provided by
>>>>>   obscuring the size and frequency of IP traffic using a fixed-sized,
>>>>>   constant-send-rate IPsec tunnel.  The solution allows for congestion
>>>>>   control as well.
>>>>> 
>>>>> 
>>>>> The IETF datatracker status page for this draft is:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-ipsecme-iptfs/
>>>>> 
>>>>> There are also htmlized versions available at:
>>>>> https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-02
>>>>> https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-iptfs-02
>>>>> 
>>>>> A diff from the previous version is available at:
>>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-ipsecme-iptfs-02
>>>>> 
>>>>> 
>>>>> Please note that it may take a couple of minutes from the time of 
>>>>> submission
>>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>>> 
>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>> ftp://ftp.ietf.org/internet-drafts/
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> IPsec mailing list
>>>>> IPsec@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/ipsec
>>>>> 
>>> 
>>> _______________________________________________
>>> IPsec mailing list
>>> IPsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ipsec

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to