Hi,

I agree with Brian as for the Address config DHC or RA MAY be used and
SLAAC is MUST.

Regards,
Prasad Gorja
Technical Project management
Freescale Semiconductor
 

-----Original Message-----
From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of
ipv6-requ...@ietf.org
Sent: Friday, July 23, 2010 11:49 PM
To: ipv6@ietf.org
Subject: ipv6 Digest, Vol 75, Issue 21

If you have received this digest without all the individual message
attachments you will need to update your digest options in your list
subscription.  To do so, go to 

https://www.ietf.org/mailman/listinfo/ipv6

Click the 'Unsubscribe or edit options' button, log in, and set "Get
MIME or Plain Text Digests?" to MIME.  You can set this option globally
for all the list digests you receive at this point.



Send ipv6 mailing list submissions to
        ipv6@ietf.org

To subscribe or unsubscribe via the World Wide Web, visit
        https://www.ietf.org/mailman/listinfo/ipv6
or, via email, send a message with subject or body 'help' to
        ipv6-requ...@ietf.org

You can reach the person managing the list at
        ipv6-ow...@ietf.org

When replying, please edit your Subject line so it is more specific than
"Re: Contents of ipv6 digest..."


Today's Topics:

   1. Re: Issue 20: Node Requirements - DHC vs. RA text
      (Brian E Carpenter)
   2. RE: Issue 20: Node Requirements - DHC vs. RA text
      (john.lough...@nokia.com)
   3. RE: Issue 20: Node Requirements - DHC vs. RA text
      (STARK, BARBARA H (ATTLABS))
   4. RE: Node Requirements: Issue 17 - IPsec/IKE
      (basavaraj.pa...@nokia.com)
   5. Re: Node Requirements: Issue 17 - IPsec/IKE (Arnaud Ebalard)
   6. Re: Node Requirements: Issue 17 - IPsec/IKE (Jean-Michel Combes)


----------------------------------------------------------------------

Message: 1
Date: Fri, 23 Jul 2010 09:27:16 +1200
From: Brian E Carpenter <brian.e.carpen...@gmail.com>
Subject: Re: Issue 20: Node Requirements - DHC vs. RA text
To: Thomas Narten <nar...@us.ibm.com>
Cc: ipv6@ietf.org
Message-ID: <4c48b7b4.3070...@gmail.com>
Content-Type: text/plain; charset=UTF-8


> To summarize, the current document
>  - retains  SLAAC as a MUST
>  - lists DHC (for address config) as a MAY
>  - makes DHC for other configuration a SHOULD.
>  - lists rfc5006bis (DNS RA Config) as a SHOULD
> 
> Thoughts?

That seems compatible with reality, although I'd expect most software
writers to treat DHC as a "MUST implement" in practice.

    Brian


------------------------------

Message: 2
Date: Fri, 23 Jul 2010 05:46:33 +0200
From: <john.lough...@nokia.com>
Subject: RE: Issue 20: Node Requirements - DHC vs. RA text
To: <brian.e.carpen...@gmail.com>, <nar...@us.ibm.com>
Cc: ipv6@ietf.org
Message-ID:
        
<1f18d6510cf0474a8c9500565a7e41a22d4d24c...@nok-eumsg-02.mgdnok.nokia.co
m>
        
Content-Type: text/plain; charset="us-ascii"

I think for general purpose nodes, ones that can expect to be deployed
in a number of different scenarios (or are mobile / nomadic), I would
agree with Brian.  When a node attaches to a network, it will not know
before hand what kind of configuration is supported by the network.

John

> -----Original Message-----
> From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf 
> Of ext Brian E Carpenter
> Sent: Thursday, July 22, 2010 2:27 PM
> To: Thomas Narten
> Cc: ipv6@ietf.org
> Subject: Re: Issue 20: Node Requirements - DHC vs. RA text
> 
> 
> > To summarize, the current document
> >  - retains  SLAAC as a MUST
> >  - lists DHC (for address config) as a MAY
> >  - makes DHC for other configuration a SHOULD.
> >  - lists rfc5006bis (DNS RA Config) as a SHOULD
> >
> > Thoughts?
> 
> That seems compatible with reality, although I'd expect most software 
> writers to treat DHC as a "MUST implement" in practice.
> 
>     Brian
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------


------------------------------

Message: 3
Date: Fri, 23 Jul 2010 09:20:54 -0400
From: "STARK, BARBARA H (ATTLABS)" <bs7...@att.com>
Subject: RE: Issue 20: Node Requirements - DHC vs. RA text
To: "Thomas Narten" <nar...@us.ibm.com>
Cc: ipv6@ietf.org
Message-ID: <750bf7861ebbe048b3e648b4bb6e8f4f14ec2...@crexc50p>
Content-Type: text/plain;       charset="US-ASCII"

> To summarize, the current document
>  - retains  SLAAC as a MUST
>  - lists DHC (for address config) as a MAY
>  - makes DHC for other configuration a SHOULD.
>  - lists rfc5006bis (DNS RA Config) as a SHOULD

I would prefer if nodes were required (MUST) to support one or the other
mechanism for DNS config. Given SLAAC is a must, it would probably make
the most sense to make rfc5006 the must.

My goal is predictability. From a service provider help desk
perspective, if I'm trying to troubleshoot a customer who can't get
their Internet connection working, and I discover that they can ping an
IPv4 address (and somehow also test they can ping an IPv6 address), but
not a FQDN, then my next steps are much easier if I can predict how DNS
is acquired. This is not an uncommon scenario in IPv4. Having to figure
out if the device supports DNS by RA or DHCPv6, and has one or the other
or both enabled, adds unnecessary steps and complexity to
troubleshooting. 

The routers the service provider ships would also have to be default
configured to provide the identical DNS info through both mechanisms.

All of this extra effort could be avoided (and better user experience
provided) if one of the mechanisms were required.
Barbara


------------------------------

Message: 4
Date: Fri, 23 Jul 2010 18:58:53 +0200
From: <basavaraj.pa...@nokia.com>
Subject: RE: Node Requirements: Issue 17 - IPsec/IKE
To: <nar...@us.ibm.com>, <juli...@qualcomm.com>
Cc: ipv6@ietf.org
Message-ID:
        
<faab54171a6c764e969e6b4cb3c2add21c18dee...@nok-eumsg-03.mgdnok.nokia.co
m>
        
Content-Type: text/plain; charset="us-ascii"


IPsec and IKEv2 are network layer protocols that are available in the
security toolkit.
And so are TLS, ssh, Kerberos etc. 

The IETF cannot force the choice of a security protocol on applications
or other protocols that need security. The choice of using IPsec and
IKEv2 is available at all times. But it may not be the best fit in all
cases. SDOs, application and protocol developers should be free to
choose from the available options. An application may be deployed with
different security mechanisms in different environments. A good example
is IPsec VPNs as well as SSL VPNs.

Use of IPsec on host devices today is primarily for a single usecase,
i.e VPN connectivity. 
IPsec is used within the core of a network for many purposes. Some
end-hosts may be constrained and mandating IPsec/IKEv2 in order to be
IPv6 compliant is unwarranted. And other end-hosts which do support
IPsec/IKEv2 may use it for some use cases and applications. But it
should not be the IETFs role to mandate that it be the security protocol
used in all cases. 

Hence a SHOULD require is sufficient in the context of IPv6
node-requirements.

-Raj

-----Original Message-----
From: ipv6-boun...@ietf.org [mailto:ipv6-boun...@ietf.org] On Behalf Of
ext Thomas Narten
Sent: Wednesday, July 21, 2010 3:12 PM
To: Laganier, Julien
Cc: ipv6@ietf.org
Subject: Re: Node Requirements: Issue 17 - IPsec/IKE

Hi Julien.

Just commenting on your last point..

> We should still make sure that every IPv6 node has means to protect 
> its network layer, and make both IPsec and IKEv2 MUST implement. I'd 
> be fine with documenting an exception for constrained nodes where it 
> is not possible to fulfill the requirements, e.g., "Support of both 
> IPsec and IKEv2 is a MUST for IPv6 nodes, except for constrained 
> devices that cannot support implementations of IPsec and IKE."

The difficulty with such wording is we now start arguing about what a
"constrained device" is.  This is a judgement call, and is often not
about whether it can be done, but whether it should be done at the
expense of some other feature deemed more valuable to device's main
function. Or by increasing the cost of the device (by adding more
memory, etc.)

I do like the idea of clarifying that network layer security is a good
general thing and that IPsec/IKE is the solution for that. But this
still begs the question in that network layer security is simply not a
requirement for all applications and usages of an IP device (IMO).

Thomas
--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------


------------------------------

Message: 5
Date: Fri, 23 Jul 2010 19:38:51 +0200
From: a...@natisbad.org (Arnaud Ebalard)
Subject: Re: Node Requirements: Issue 17 - IPsec/IKE
To: <basavaraj.pa...@nokia.com>
Cc: nar...@us.ibm.com, juli...@qualcomm.com, ipv6@ietf.org
Message-ID: <87eieu85ec....@small.ssi.corp>
Content-Type: text/plain; charset=us-ascii

Hi,

<basavaraj.pa...@nokia.com> writes:

> IPsec and IKEv2 are network layer protocols that are available in the 
> security toolkit. And so are TLS, ssh, Kerberos etc.

TLS, ssh and Kerberos are available in "the security toolkit" but they
are not network layer protocols. IP and IPsec are.

> The IETF cannot force the choice of a security protocol on 
> applications or other protocols that need security.

That's correct and that's not what the node requirements doc is about:
it's about mandating *support*, and not use.

> The choice of using IPsec and IKEv2 is available at all times.

In order for that to be true, you need system that *support* the
protocols, i.e. implement it. This is what you are trying to prevent
even for system that have enough resources.

> But it may not be the  best fit in all cases. SDOs, application and 
> protocol developers should be free to choose from the available 
> options.

Completely true. And having IPsec and IKEv2 available on a system will
never prevent someone to use TLS. It's even likely they will use the
same libraries/foundations.

> An application may be deployed with different security mechanisms in 
> different environments. A good example is IPsec VPNs as well as SSL 
> VPNs.
>
> Use of IPsec on host devices today is primarily for a single usecase, 
> i.e VPN connectivity. IPsec is used within the core of a network for 
> many purposes.

That's the point. Having IPsec/IKE *available* on all nodes leaves room
for the deployment of the protocol for E2E security. Additionally, it
does not prevent at all the use of additional mechanisms. It will never
replace TLS or ssh, because they serve different purposes.

> Some end-hosts may be constrained and mandating IPsec/IKEv2 in order 
> to be IPv6 compliant is unwarranted.

I think we all agree on that. The problem is not IPsec/IKEv2 here.It's
not constrained devices either. It's the fact that we do not have an
easy way (in RFC keywords) to mandate support for all devices if they
can reasonably do it w/o making constrained devices look like they are
not IPv6 nodes because they cannot have it.

> And other end-hosts which do support IPsec/IKEv2 may use it for some 
> use cases and applications. But it should not be the IETFs role to 
> mandate that it be the security protocol used in all cases.

Again, I don't understand your position: having IPsec/IKEv2 available on
systems that have sufficient resources to run those does not impose its
*use*. It just guarantees that it is available if you need it.

Cheers,

a+


------------------------------

Message: 6
Date: Fri, 23 Jul 2010 20:19:36 +0200
From: Jean-Michel Combes <jeanmichel.com...@gmail.com>
Subject: Re: Node Requirements: Issue 17 - IPsec/IKE
To: Thomas Narten <nar...@us.ibm.com>
Cc: ipv6@ietf.org
Message-ID:
        <aanlktikfptfqrv4-ntq91_zuaymp2glxx7tutqkv0...@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1

Hi,

My first choice was (in respect with RFC 2119):
- a MUST for IPsec
Because IPsec is the security architecture for the IP layer.
- a SHOULD for IKEv2
Because,
   o Anti-replay service available for AH and ESP requires automated SA
management (cf. RFC 4301)
   o Regarding scalability/deployment, IKEv2 is useful
   o Some IPv6 nodes may have constraints (e.g. 6lowpan nodes), even if
I believe that constraints, with time and improvement of technologies,
disappear in the end.

but seeing that some people deliberately interpret "SHOULD" as a "MAY"
(i.e. the good technical reason to avoid the implementation of the
protocol is in fact only a political/company/personal - make your choice
- reason), I've decided to change my mind:
- a MUST for IPsec
- a MUST for IKEv2

Best regards.

JMC.

2010/7/20 Thomas Narten <nar...@us.ibm.com>:
> Folks,
>
> A revised version of draft-ietf-6man-node-req-bis-05.txt has been 
> published, but it's Security section needs work. In particular, the WG

> needs to answer the following questions:
>
> ?- Should IPsec be a SHOULD or MUST?
> ?- What about IKEv2?
>
> Let me start with some background:
>
> RFC 4294 says the following:
>
>> 8. ?Security
>>
>> ? ?This section describes the specification of IPsec for the IPv6
node.
>>
>> 8.1. ?Basic Architecture
>>
>> ? ?Security Architecture for the Internet Protocol [RFC-4301] MUST be

>> ? ?supported.
>>
>> 8.2. ?Security Protocols
>>
>> ? ?ESP [RFC-4303] MUST be supported. ?AH [RFC-4302] MUST be
supported.
>
> ...
>
>> 8.4. ?Key Management Methods
>
>> ? ?An implementation MUST support the manual configuration of the ? 
>> ?security key and SPI. ?The SPI configuration is needed in order to ?

>> ?delineate between multiple keys.
>>
>> ? ?Key management SHOULD be supported. ?Examples of key management ? 
>> ?systems include IKEv2 [RFC-4306] and Kerberos; S/MIME and TLS 
>> include ? ?key management functions.
>>
>> ? ?Where key refresh, anti-replay features of AH and ESP, or 
>> on-demand ? ?creation of Security Associations (SAs) is required, 
>> automated keying ? ?MUST be supported.
>>
>> ? ?Key management methods for multicast traffic are also being worked

>> on ? ?by the MSEC WG.
>
> There are a couple of problems with the above text.
>
> First, AH [RFC4302] is listed as a MUST. This is old/obsolete. The 
> newer versions of the IPsec architecture have changed this to a MAY. 
> ESP now includes integrity protection, so one can achieve 
> authentication via ESP and NULL encryption. Thus, the node 
> requirements document will change AH to a MAY. (This should not be a 
> controversial change.)
>
> The real issue though is as follows:
>
> The key managment recommendation is only a SHOULD, yet doesn't 
> actually recommend one particular protocol. That said, the only 
> available key management protocol is effectively IKE. Thus, the Node 
> Requirements recommendation is a SHOULD for IKE (and IKEv2 in 
> particular).
>
> But, RFC 4301 (the Security Architecture) is listed as a MUST. If one 
> looks at 4301 closely, it effectively mandates IKEv2 (see 
> http://www.ietf.org/mail-archive/web/ipsec/current/msg06259.html). 
> That is, the IPv6 Node Requirements RFC says SHOULD for IKEv2, yet 
> indirectly also says MUST for IKEv2. Talk about wanting it both 
> ways...
>
> Some more thoughts.
>
> 1) Mandating IPsec (just ESP) without also supporting a key management

> ? protocol has rather limited applicability. For many years, the IPv6 
> ? WG has insisted on IPsec being a MUST (for strong security), but in 
> ? the absence of key management, that requirement (IMO) rings hollow.
>
> 2) The IPv6 WG has in the past been hesitant to mandate IKE for all ? 
> hosts. This was viewed as a difficult requirement for some ? devices. 
> Although there are more implementations of IKE today, I ? suspect 
> there would still be hesitation to mandate IKE on all ? nodes.
>
> 3) We've gained a lot of experience with security and security ? 
> protocols over the last decade. ?If there is one overarching ? lesson,

> it's that security isn't easy, and it's not just about ? protocols. 
> It's also about key distribution, certificates, ? operational 
> practices, etc.
>
> ? Moreover, it is now recognized that with security, there is no ? 
> one-size-fits-all panacea. We have a plethora of security ? 
> technologies (ssh, ssl, tls, IPsec, etc.) and some really are more ? 
> appropriate for some applications than others. ?So IPsec is not ? 
> going to turn out to be the single "holy grail" security ? technology.

> It has its place, and I expect we'll see a lot more ? usage of it over

> the next decade, but it is not likely to displace ? all other 
> approaches. And for some classes of devices and ? applications, other 
> security protocols will be more appropriate ? than IPsec.
>
> 4) The breadth and range of devices that support IP is simply ? 
> staggering. Many are small, and some are so small, they really do ? 
> have legitmate issues with supporting IKEv2. Does it make sense for ? 
> the IETF to mandate that an iPod run IPsec and/or IKE? Sensor ? 
> devices? ?Personally, I don't think so.
>
> ? Even the current recommendation that IPsec/ESP be a MUST seems a ? 
> bit like ivory-tower syndrome. IPsec does make sense in a lot of ? 
> environments, but simply isn't required in all devices. And having ? 
> the IETF say it is required hasn't forced all vendors to implement ? 
> IPsec in their devices.
>
> Thus, it is my recommendation that the next version of the node 
> requirements document make support for IPsec and IKE both SHOULDs 
> only, with a lot more explanatory text that makes it clear that there 
> are some types of devices where IPsec is not necessarily the best 
> choice.
>
> Thoughts?
>
> Proposed new text:
>
> 10. ?Security
>
> ? This section describes the specification of IPsec for IPv6 nodes.
>
> ? Achieving security in practice is a complex undertaking.
> ? Operational procedures, protocols, key distribution mechanisms, ? 
> certificate management approaches, etc. are all components that ? 
> impact whether security is actually achieved in practice. More ? 
> importantly, deficiencies or a poor fit in any one individual ? 
> component can significantly reduce the overall effectiveness of an ? 
> particular security approach.
>
> ? IPsec provides channel security at the Internet layer, making it ? 
> possible to provide secure communication for communication flows ? 
> between pairs of internet hosts. IPsec provides sufficient ? 
> flexibility and granularity that individual TCP connections can ? 
> (selectively) be protected, etc.
>
> ? IKEv2 is the key management protocol for IPsec. Although manual ? 
> keying can be used with IPsec in some cases, the overall ? 
> applicability of statically configured keys is limited. Thus, IPsec ? 
> without IKEv2 has only limited value.
>
> ? A range of security technologies and approaches proliferate today ? 
> (e.g., IPsec, TLS, SSL, SSH, HTTPS, etc.) No one approach has ? 
> emerged as an ideal technology for all needs. It seems clear that ? 
> for the foresable future, that situation will not change. Moreover, ? 
> IPsec is not viewed as the ideal security technology for all ? 
> approaches and is unlikely to displace the others. That is, IPsec ? is

> not viewed as a good choice for all security needs.
>
> ? Previously, IPv6 mandated implementation of IPsec and recommended ? 
> the key management approach of IKE. This document updates that ? 
> recommendation by making support of both IPsec and IKEv2 a SHOULD ? 
> for IPv6 nodes. In particular, it is recognized that there are a ? 
> range of device types and environments where other approaches to ? 
> security than IPsec can be more appropriate. This is particularly ? 
> the case for smaller specialized, single-purpose devices that ? 
> support only very limited applications or run on constrained ? 
> hardware. In other environments, support for IPsec and IKEv2 should ? 
> be considered a very strong SHOULD, if not a MUST.
>
>
> 10.1. ?Requirements
>
> ? Security Architecture for the Internet Protocol [RFC4301] SHOULD be 
> ? supported by all nodes. Those nodes implementing the Security ? 
> Archecture MUST support ESP [RFC4303] and MAY support AH ? [RFC4302]. 
> In addition, such nodes SHOULD implement IKEv2 [RFC4306].
>
> 10.2. ?Transforms and Algorithms
>
> ? The current set of mandatory-to-implement algorithms for ESP and AH 
> ? are defined in 'Cryptographic Algorithm Implementation Requirements 
> ? For ESP and AH' [RFC4835]. ?IPv6 nodes implementing IPsec MUST ? 
> conform to the requirements in [RFC4835].
>
> 10.3. ?Key Management Methods
>
> ? An implementation MUST support the manual configuration of the ? 
> security key and SPI. ?The SPI configuration is needed in order to ? 
> delineate between multiple keys.
>
> ? Where key refresh, anti-replay features of AH and ESP, or on-demand 
> ? creation of Security Associations (SAs) is required, IKEv2 keying ? 
> MUST be supported.
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>


------------------------------

_______________________________________________
ipv6 mailing list
ipv6@ietf.org
https://www.ietf.org/mailman/listinfo/ipv6


End of ipv6 Digest, Vol 75, Issue 21
************************************


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to