Hi Gorry,

> -----Original Message-----
> From: Gorry Fairhurst [mailto:go...@erg.abdn.ac.uk]
> Sent: Tuesday, April 11, 2023 7:22 PM
> To: Valery Smyslov; tsv-...@ietf.org
> Cc: draft-ietf-ipsecme-g-ikev2....@ietf.org; ipsec@ietf.org
> Subject: Re: [Tsv-art] Tsvart early review of draft-ietf-ipsecme-g-ikev2-08
> 
> On 11/04/2023 14:09, Valery Smyslov wrote:
> > Hi Gorry,
> >
> > thank you for your review. Please see inline.
> See below, marked [GF]
> >> Reviewer: Gorry Fairhurst
> >> Review result: Ready with Issues
> >>
> >> This is an early review of Group Key Management using IKEv2 concerns 
> >> transport
> >> issues. It does not comment on the maturity of security aspects, which are 
> >> the
> >> primary concerns of the specification.
> >>
> >> Transport issues that may be relevant:
> >>
> >> 1. PMTUD and PLPMTUD are transport mechanisms. In 2.4.1.2. mention is made 
> >> of
> >> PMTUD, bit it was not clear to what was intended and what needs to be done:
> >> /PMTU probing cannot be performed due to lack of GSA_REKEY response 
> >> message./
> >> Some additional text, and a cross reference to a section in another RFC 
> >> would
> >> seem helpful here: What is /probing/ in this context? Maybe it would help 
> >> to
> >> explain a little and cite an RFC for PMTUD, if that is what is intended?
> > This piece of text is not related to classic PMTUD/PLMTUD mechanisms.
> > Instead, it is related to the PMTUD process described in Section 2.5.2 of 
> > RFC 7383,
> > which is a bit specific (sender starts from larger packets and retransmits
> > smaller packets if it receives no reply).
> >
> > We can clarify this. How about the following?
> >
> >     *  PMTU mechanism, defined in Section 2.5.2 of [RFC7383], cannot be 
> > used due to lack of
> GSA_REKEY response
> >        messages.
> [GF] Aha - that text would indeed be clearer.

OK.

> >> 2. The document discuses protection from replay, but it seems the mechanism
> >> will also impacted by the effect of path reordering, and that interaction
> >> should be described to explain that packet re-ordering can occur on some
> >> Internet paths and how this will impact Replay/Reflection Attack 
> >> Protection,
> >> presumably it will simply result in some packet loss? Could it trigger
> >> retransmission?
> > If we are talking about GSA_REKEY messages, then the replay protection
> > mechanism (incrementing counter) will cause packets loss in case of 
> > reordering.
> > In other words, if GM receives message with MessageID equal to N,
> > it will then ignore any messages with MessageID <= N.
> >
> > However, in real life this should not cause problems, because
> > GSA_REKEY messages are infrequent (usually one per few hours,
> > in extreme cases one per several minutes).
> >
> > The packet loss cannot trigger retransmissions, because there is no
> > back channel from GMs to GCKS. However, there are mechanisms
> > that allow receiving GMs that miss the next GSA_REKEY message to recover
> > (see Sections 2.4.1.3 and 4.4.2.2.3).
> [GF] I uinderstand now, could the ID say something?

We can add the following clarification into 2.4.1.4:

            Since GSA_REKEY messages are infrequent (typically one per several 
hours or, 
            in extreme cases, several minutes), packet reordering is not a 
problem.

Is it OK or more text is needed?

> >> 3. RFC8055 describes BCP guidance for congestion control: Retransmission is
> >> described in 2.4.1.3. Are the retransmitted messages subject to congestion
> >> control? or some form of rate limit? There is a maximum interval for
> >> retransmission discussed, but there is not a mention of a minimum 
> >> interval, or
> >> what happens when a retransmission fails? Specifically, is the 
> >> retransmission
> >> time period backed-off, or is there a limit on the of retries?
> > No, there is no congestion control, because there is no back channel from 
> > GMs to GCKS.
> > It is assumed that the GSA_REKEY messages are infrequent to not cause
> > any congestion. If several GSA_REKEY messages are sent to mitigate possible 
> > packet loss,
> > then the draft suggests that they are not sent at once, but instead be sent
> > with some delay (few seconds) to avoid any possible congestion.
> >
> > The concrete delay and number of sent packets are not defined in the draft,
> > since they don't affect interoperability (following long practice of IPsec 
> > WG documents).
> >
> A few seconds, seems to align with what I hoped. You will know best
> whether that needs any text or not.

I believe no new text is needed.

> >> 4. What is required by:  /If the GM and the GCKS used UDP port 848 for the
> >>   IKE_SA_INIT exchange, they MUST behave as if they used UDP port 500./ 
> >> This
> >>   reads as if there normative requirements, but I am unsure what they are, 
> >> and
> >>   specifically what is intended by /behave as if/. Perhaps though, it only 
> >> means
> >>   the same method needs to be followed when port 848 is used instead of 
> >> using
> >>   port 500?
> > The intended meaning of this text was that the behavior of GMs and GCKS must
> > not depend on the port they created initial IKE SA over. How can we state 
> > this more clearly?
> 
> That proposed text works fine with the example you have... e.g.
> something like this:
> 
> The behavior of GMs and GCKS MUST NOT depend on the port used to create the 
> initial IKE SA.
> For exmaple, if the GM and the GCKS used UDP port 848 for the IKE_SA_INIT 
> exchange, they
> will operate the same as if they had used UDP port 500.

OK, will use this text. Thank you.

Regards,
Valery.

> >> Editorial issues:
> >> /that allows to perform a group key management./
> >> which allows this to perform a group key management./
> > Changed to "which allows performing a group key management". Is it better?
> [GF] yes.
> >
> >> /describes how IKEv2 deals with NATs/
> >> - sound a little judgmental, could this be:
> >> - /describes how IKEv2 supports paths with NATs/
> >> - or
> >> - /describes how IKEv2 interacts with paths with NATs/
> > Changed to "describes how IKEv2 supports paths with NATs".
> 
> [GF] :-)
> 
> 
> >
> > Regards,
> > Valery.
> >
> > _______________________________________________
> > Tsv-art mailing list
> > tsv-...@ietf.org
> > https://www.ietf.org/mailman/listinfo/tsv-art
> 
> Bets wishes,
> 
> Gorry

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to