Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Mon, 14 November 2016 07:42 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 654971296C9 for <dhcwg@ietfa.amsl.com>; Sun, 13 Nov 2016 23:42:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1LkhwCh0SfYD for <dhcwg@ietfa.amsl.com>; Sun, 13 Nov 2016 23:42:41 -0800 (PST)
Received: from mail-qk0-x22a.google.com (mail-qk0-x22a.google.com [IPv6:2607:f8b0:400d:c09::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9016129689 for <dhcwg@ietf.org>; Sun, 13 Nov 2016 23:42:40 -0800 (PST)
Received: by mail-qk0-x22a.google.com with SMTP id n204so86343142qke.2 for <dhcwg@ietf.org>; Sun, 13 Nov 2016 23:42:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=22oFKV5n1bvUNDMit4KbdFfANCs+26/RuhAVf8aSTuk=; b=TgXqppbDuhT84YmbkOuHRomb98UwJxlzACx4TgNot/gYKQLbnj+LXlGpUBQFDnCmsJ H76f+1T8GwQlRg1U3irg65XVHdTLAEsucxra2jUbcRyEUZT/XouSRIsx6p8Cl7O+7rhd R1zEMHdsPIFFafaMWKPqSmRb2GIGg2q2KBhaZPwlJHhlXLPaXM/Fu7TVXb2ibbNK625c 637IaStIAU9/dtxNaGUIpx3S65JG2ZFJQTWX6YEz9CoaXNmQ1ArxZKrTGdUqSnQGOiTT eau+y1NO6UJa0pOxsKiqDN2xkrdK8YvmUq5SgmgTNMI+a0DZKggcv47zsAuf3KrH8KAg DIIA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=22oFKV5n1bvUNDMit4KbdFfANCs+26/RuhAVf8aSTuk=; b=U4v+6z1n/gsNEmM6ISC4SGvfHxBymzX2dEGGuxv/d6QhMPGAyW9k7/3C+Pw975t7p/ ttSdI0kzkTXtAtVu72o8x391MdiqBnEcvcHso2qJioo91lILm9s/cry5Y6yFNB/a2K7P 933LtL5yny4Rq3tRH01NPYM4VS4KMAnX7pCPKh3EJMRU3Ljqj5bMGoU4AK+zmXeVqm3o 2l8G7epfzPc3Cil4mF6R5OIHEfdsCzZeAanXm3NzFbI6STmrG72fL4A2bKX8RJR/IKXo zvlpp1IyHPASFnDl7N7xfDaUjTp7pDc52l7u2EE6H7LUSiEoKhM08K0dR4Erb/U8EQ5x hTZQ==
X-Gm-Message-State: ABUngvfzhOiLInGmcbhelBel9NLtKvhvY4dpuNOwtBnpKuOCDtRV5M6weE2zcLjvA1nSsf2CAH8ASM3IkJmD2Q==
X-Received: by 10.55.38.80 with SMTP id y77mr15328960qkg.51.1479109359936; Sun, 13 Nov 2016 23:42:39 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Sun, 13 Nov 2016 23:42:39 -0800 (PST)
In-Reply-To: <CAJE_bqfRBYkrniWQ+vtPULTURnvyV792QNGvr8JhhZpGQ0MSdA@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com> <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com> <CAJ3w4Nd3s+ZojjiotLkKwys6truhUgK6F-90UYjcpB9iw=fKKQ@mail.gmail.com> <m2r36nuqvn.wl%jinmei.tatuya@gmail.com> <CAJ3w4NeuNYTrX4p5rtZ6UceD5ydQ-B-vY6aqQzxWnXsrDOEFEA@mail.gmail.com> <CAJE_bqdh-bgk7BHZJnaFFBr3PDj4ZnSSGeGNdQ70F7dv91iQrA@mail.gmail.com> <CAJ3w4NfU9PrC9a+MGnJ=Es1yir_asHB3p1=9GfxZZ0iSe+At+Q@mail.gmail.com> <CAJE_bqfRBYkrniWQ+vtPULTURnvyV792QNGvr8JhhZpGQ0MSdA@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Mon, 14 Nov 2016 15:42:39 +0800
Message-ID: <CAJ3w4NerRzHYsRqcUAkAjHX23PYVF4Jv0wKcd33vXRRg+-0EAQ@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a11454c6cfbaadf05413dfb75"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/ARgEIxbeXj8JqKSX5tFk3ObCG4A>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2016 07:42:43 -0000

2016-11-12 1:33 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:

> At Thu, 10 Nov 2016 00:48:53 +0800,
> Lishan Li <lilishan48@gmail.com> wrote:
>
> > > It'll be possible (and probably quite common) to share the same
> > > certificate (public key) for both encryption and signature.  For
> > > example, if we use RSA for encryption and RSASSA, it's quite likely
> > > that we can use the same public key.  But, unless we impose an
> > > explicit relationship between these two algorithms as part of the
> > > protocol specification we cannot always assume that, so the protocol
> > > itself should be generic so that it will work even if encryption and
> > > signature algorithms are totally independent.  That's why I stated the
> > > above example: "add a new field for the certificate option to specify
> > > for which it's supposed to be used: encryption, authentication, or
> > > both."
> > >
> > > Whether to impose such an "explicit relationship" is a different
> > > question, btw.  I think that's certainly an option and can make the
> > > spec simpler at the cost of making it less flexible, but that should
> > > be discussed and described in the spec explicitly, instead of leaving
> > > it as an implicit assumption.
> > >
> > [LS]: There are two types of certificate: one type is used for encryption
> > and authentication, which contains the public key for encryption
> algorithm;
> > another type is used for signature versification, which contains the
> public
> > key for signature algorithm. We can set one field for this. If the field
> is
> > zero, then it indicates the first type. If the field is 1, then it
> > indicates the
> > second type.
>
> There are THREE types of certificates:
> - one type is used only for encryption, which contains the public key
>   for the encryption algorithm
> - another is used only for authentication, which contains the public
>   key for the signature algorithm
> - yet another is used both for encryption and authentication, which
>   contains the public key for the encryption and signature algorithms.
>
> So...
>
> > We can set one field for this. If the field is
> > zero, then it indicates the first type. If the field is 1, then it
> > indicates the
> > second type.
>
> ...if this is a proposal of adding a new field to the certificate
> option, yes, I think that's one way forward except that there are
> three types.
>
> Alternatively, we might add both an EA-id and SA-id fields to the
> option:
>
>     0                   1                   2                   3
>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>    |      OPTION_CERTIFICATE       |         option-len            |
>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>    |            EA-id              |            SA-id              |
>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>    |                                                               |
>    .                  Certificate List(variable length)            .
>    |                                                               |
>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> (I'm not sure if this has to be a list of certificates instead of one
> certificate, but that's a different question).


> And we can use a value of 0 for EA-id and SA-id to mean this
> certificate is not supposed to be used for encryption and signature,
> respectively.  (The combination of 0, 0 makes no sense so we should
> probably prohibit the use of it explicitly).
>
[LS]: So, there is no need to define a new field. The EA-id and SA-id are
used to identify the certificate type.
And the certificate list field should be changed to certificate field. If
multiple
certificates are contained, then multiple certificate option is contained.

Best Regards,
Lishan