Hi, also inline:

Thanks!

Ben.


> On Aug 4, 2017, at 1:40 PM, Dhruv Dhody <dhruv.dh...@huawei.com> wrote:
> 
> Hi Ben, 
> 
> Please see inline...
> 
>> -----Original Message-----
>> From: Ben Campbell [mailto:b...@nostrum.com]
>> Sent: 03 August 2017 20:57
>> To: Dhruv Dhody <dhruv.dh...@huawei.com>
>> Cc: The IESG <i...@ietf.org>; cmarga...@juniper.net; draft-ietf-pce-
>> pc...@ietf.org; pce@ietf.org; pce-cha...@ietf.org
>> Subject: Re: [Pce] Ben Campbell's Discuss on draft-ietf-pce-pceps-15:
>> (with DISCUSS and COMMENT)
> 
> (snip)
> 
>>>> 
>>>> ---------------------------------------------------------------------
>>>> -
>>>> COMMENT:
>>>> ---------------------------------------------------------------------
>>>> -
>>>> 
>>>> Substantive:
>>>> 
>>>> - I share Warren's question about why you chose STARTTLS over a
>>>> dedicated port, especially since the 2nd to last paragraph in 3.2
>>>> goes out of its way to mention that. What were the tradeoffs involved
>>>> that made adding the additional protocol machinery more attractive
>>>> than allocating a port number?
>>>> 
>>> [[Dhruv Dhody]] I have added this text -
>>> 
>>>  This document uses the standard StartTLS procedure in PCEP, instead
>>>  of using a different port for the secured session.  This is done to
>>>  avoid requesting allocation of another port number for the PCEPS.
>>>  The StartTLS procedure makes more efficient use of scarce port
>>>  numbers and allow simpler configuration of PCEP.
>> 
>> That’s helpful, but it only shows the benefits side of the tradeoff. I
>> assume people thought the additional protocol complexity was a reasonable
>> cost to bear?
>> 
> [[Dhruv Dhody]] There was substantive discussion on the mailing list 
> regarding this, as our original proposal requested a new port and we were 
> advised to use StartTLS instead after discussion with transport/security 
> folks. See https://www.ietf.org/mail-archive/web/pce/current/msg03540.html. 

Okay, good enough.


> 
> 
>> 
>>> 
>>>> - 3.2: "Implementations MUST support SHA-256 as defined by [SHS] as
>>>>         the hash algorithm for the fingerprint."
>>>> Do you really intend "MUST support" (meaning you have to be able to
>>>> handle sha-256, but could allow other hashes) vs "MUST use"?
>>>> 
>>> [[Dhruv Dhody]] Yes, additional hash algorithm MAY also be
>> supported/used.
>>> 
>> 
>> Is there an expectation people will use multiple hash algorithms side-by-
>> side? Or is this for purposes of hash agility?
>> 
> [[Dhruv Dhody]] SHA-256 is the current mandatory hash, others might become 
> usable and useful as the technology evolves. Do you have any suggested change 
> in mind? 
> I see RFC6614 use similar language "Implementations MUST support SHA-1 as the 
> hash algorithm for the fingerprint…."

I guess my question is whether the intent is for implementations to be able to 
pick any hash they want, as long as SHA-256 is an option, or do you expect 
everyone to use SHA-256 unless that is replaced at some point due to security 
concerns. If the former, “MUST support…” makes sense. If the latter, something 
like “MUST  (or SHOULD) use…” with a caveat that future specs might update this 
if SHA-256 is proven unsafe at some point in the future.

My real concern here is interoperability—if an implementation chooses a hash 
other than SHA-256, how does the peer know what hash to use?

> 
> (snip)
> 
>>>> - 3.4 : "Negotiation of mutual authentication is REQUIRED."
>>>> Does that mean that the peers must elect to use mutual
>>>> authentication, or that if they want to use it, they must agree to do
>>>> so? (The pattern persists throughout the section, but the meaning
>>>> seems more obvious for some of the
>>>> others.)
>>>> 
>>> [[Dhruv Dhody]] I am also not sure, this was added keeping RFC6614 as
>> our reference.
>>> Since TLS supports multiple authentication mode, this might be a say
>>> mutual as well as server-only authentication should be supported. But
>>> not sure about the word negotiation here. I think we can remove this
>>> statement, will do so once you confirm. he
>> 
>> The important thing is that the intent of the WG is clear. Do you mean to
>> say that the working group intended to allow both server-only and mutual
>> authentication, or do you mean to say the working group did not think
>> about it?
>> 
> [[Dhruv Dhody]] On further discussion with my co-authors, we feel we should 
> remove the statement. The previous statement in the draft about mutual 
> authentication is enough and mutual authentication should be the standard. 

Okay.

> 
> Regards,
> Dhruv
> 
>> […]
>> Thanks!
>> 
>> Ben.

_______________________________________________
Pce mailing list
Pce@ietf.org
https://www.ietf.org/mailman/listinfo/pce

Reply via email to