Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Fri, 25 November 2016 18:38 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29C3512964C for <dhcwg@ietfa.amsl.com>; Fri, 25 Nov 2016 10:38:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ltcsGUGYV7Z for <dhcwg@ietfa.amsl.com>; Fri, 25 Nov 2016 10:38:18 -0800 (PST)
Received: from mail-qk0-x236.google.com (mail-qk0-x236.google.com [IPv6:2607:f8b0:400d:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3387F1294FD for <dhcwg@ietf.org>; Fri, 25 Nov 2016 10:38:18 -0800 (PST)
Received: by mail-qk0-x236.google.com with SMTP id x190so85697826qkb.0 for <dhcwg@ietf.org>; Fri, 25 Nov 2016 10:38:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ECaY+TNmL9fumo6ZFnHU/OggJ3OPFb01b9S7dvVUQug=; b=p/VfoK3xOshA/Ip8J1Qds893q9diQq/L5GHCa61jwjjoyON/i1vbGZJ+ZE4KMx1epH HXeIiVweVp4YZrNRFfMnvwe4eIBmZjBOJ5TcH+EQ1+U7V2xczLY9r1/Ddh5JsDHjTVO0 ApzPgo/t4/j/1CKxSiVtF/Cg7iQxh4xCLkb4V/SZWSj3AaY8uN1MqM++mKmvkbj1+AzY PcfO3g5zf6WZXQKCHW+n2fqgmz+KVHdDPyEBqv+1AcwNWLrEyuQe0e3h4ARGymV+c7hB kta/IgmzlsIQJiUGgKxkz/82E5lZbHBBIXQilvsfiOC29cSGQfar5uBivhmte5Q8DgWC x1Vg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ECaY+TNmL9fumo6ZFnHU/OggJ3OPFb01b9S7dvVUQug=; b=C7G8aL5UL/8ln2nW6XGo2Lc5lQTtykglOD17xUqAAaiuPM6X4TMlWlzS36S1/KmyqS LAN8lhvzr1sj3qTN/eSiozSuR6alOzQtO2iev8jeGeLWEAIvh/NORLAWLjOQmST7jzU0 EcDBXBeWXf0ndj06y/reqgF1uSskr2lbLFSDUMCJX7qw+AHSZUHPCRJAkEyD82m4uYxO o5ErWMTlSQgb5YGcCGav39TQQjI0Ks5x/RApFPTMUJcakmEedP0jjT6Wg1y41YTXxm4C qJ3zJ274hmcga780KUP5Ln2GdSsTXs58XMMLsOO//uVBhI27JoKALmG41vJrGrUXcwAH TjIg==
X-Gm-Message-State: AKaTC02U7n0ep3cZGO/RVQ4E9CSS0gU02wze05UsjDNG8O+IiECBXc4WTK4dU/oOA/O4X1njDfWv7iKcnpapmw==
X-Received: by 10.55.43.29 with SMTP id r29mr8136901qkh.211.1480099097360; Fri, 25 Nov 2016 10:38:17 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Fri, 25 Nov 2016 10:38:16 -0800 (PST)
In-Reply-To: <CAJ3w4Ne81LVsaznu_yck7fG7iJyGm=WY4=i2AF8gx39Tf59eMA@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com> <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com> <CAJ3w4Nd3s+ZojjiotLkKwys6truhUgK6F-90UYjcpB9iw=fKKQ@mail.gmail.com> <m2r36nuqvn.wl%jinmei.tatuya@gmail.com> <CAJ3w4NeuNYTrX4p5rtZ6UceD5ydQ-B-vY6aqQzxWnXsrDOEFEA@mail.gmail.com> <CAJE_bqdh-bgk7BHZJnaFFBr3PDj4ZnSSGeGNdQ70F7dv91iQrA@mail.gmail.com> <CAJ3w4NfU9PrC9a+MGnJ=Es1yir_asHB3p1=9GfxZZ0iSe+At+Q@mail.gmail.com> <CAJE_bqfRBYkrniWQ+vtPULTURnvyV792QNGvr8JhhZpGQ0MSdA@mail.gmail.com> <CAJ3w4NerRzHYsRqcUAkAjHX23PYVF4Jv0wKcd33vXRRg+-0EAQ@mail.gmail.com> <CAJ3w4NekPk0TuAZW_jmTDYQHd8JP3GsrA0qrKYrnyqSSk3qwxw@mail.gmail.com> <CAJE_bqc8hkrc3dYefTPWi-mUCtZD+oYsrobCK1KjmVGRnNfMCw@mail.gmail.com> <CAJ3w4NejrFAT3RK7i0W46HkQNJjhPxbhzQiL=3fcrceidTzHNQ@mail.gmail.com> <CAJE_bqcCwZWPHuZ0UR8_jyCUsaTrYKzLD8zUKwChYaCL06yT9A@mail.gmail.com> <CAJ3w4NfS8PKOMHcP5s_Nsp5K5eWJfXWRF-vNEau_ekqTRwE=wA@mail.gmail.com> <CAJE_bqfqSXFR9R5wf1USg-zs+nvdohQFq99kQL2DiapXvUdEqA@mail.gmail.com> <CAJ3w4Ncj40JwrW6UB+TVFvymByU5Y9iFv5QroWhwUzkLrS2DTg@mail.gmail.com> <CAJE_bqd38grUh9q57a-H29GsMx5Dpv9VE0iBMO7v_-y97zZZUg@mail.gmail.com> <CAJ3w4Ne63cnqoeTZk=PDmAN9+i6jwzyxbK+up45wB9h+xUDSfw@mail.gmail.com> <CAJE_bqceK7YLpMqhgjqrFQh7641a+ZRcnO0F6p6BiM8EMKmA7w@mail.gmail.com> <CAJ3w4Nf65b1zo-smMguZBc_-RbFh2y8kk7Fnu__TKCQEVbs48w@mail.gmail.com> <CAJE_bqeVciLxS_q=deRKLBr12ZGXxx2wdFiztJxJjfS7aAV2Ag@mail.gmail.com> <CAJ3w4NcvyeuRWJatGGH7U4g413GQvr9LHtDiX13zSOz7kBGEhw@mail.gmail.com> <CAJE_bqfFOhe26huAP8_BFKjnTXbG4F0vUfMYs5Xy=3RQigS7FA@mail.gmail.com> <CAJ3w4Ne81LVsaznu_yck7fG7iJyGm=WY4=i2AF8gx39Tf59eMA@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Sat, 26 Nov 2016 02:38:16 +0800
Message-ID: <CAJ3w4NfMX+C9XVUNOsmvGmuiW5wBfyPAd=vbHgNdUuyARYHqBg@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a1147e8e4ee40c00542246cb3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/ISQpRDixcpZAubZ9-ecCA7IdFkY>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Nov 2016 18:38:20 -0000

Another problem is that: how the client identify which public/private key
pair is used for DHCPv6 configuration process when the client have multiple
key pairs. In most cases, the client communicate with only one DHCPv6
server. Then, the client only uses one public/private key pair for the
DHCPv6 configuration process. So there is no need to define the mechanism.
Could you please check whether my understanding correct?

Best Regards,
Lishan

2016-11-25 14:29 GMT+08:00 Lishan Li <lilishan48@gmail.com>:

> 2016-11-24 3:39 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:
>
>> At Wed, 23 Nov 2016 16:28:54 +0800,
>> Lishan Li <lilishan48@gmail.com> wrote:
>>
>> > > - Introduce a new DHCPv6 option named "encryption key tag option".
>> > >   Its value is calculated from public key data (it's essentially a
>> > >   fingerprint of a specific public key).
>> > > - Encryption Query messages MUST include the encryption key tag
>> > >   option.  The option data MUST be calculated for the public key that
>> > >   the client uses to encrypt the encapsulated DHCPv6 message.
>> > >
>> > [LS]: I agreed. I have two questions:
>> > 1. How does the client calculate the key tag? Maybe the hash
>> > function can be used for the calculation.
>>
>> Anything that would generate reasonably different values for different
>> keys (but it doesn't have to be guaranteed) is fine.  A simple
>> "checksum" like the RRSIG key tag would probably suffice; using a
>> commonly known modern hash is also fine.
>>
> [LS]: So it is mostly a implementation problem and don't need to specify
> it. Because for the algorithm agility, we defines the algorithm negotiation
> mechanism between the client and server. So I the key tag generation
> algorithm may also need negotiation mechanism. And then, the generation
> algorithm should also be defined in our document.
> Looking forward to your guidance.
>
> > 2. For the first received Encrypted-Query message, how does the
>> > server identifies the corresponding private key through the acknowledged
>> > key tag?
>> > one way is that: The server tries all the possible private key
>> > and record the relation of key tag and the corresponding private key.
>> > Another method is that: The server calculates the key tags of all the
>> > private key and then finds the corresponding private key.
>> > Looking forward to your further guidance.
>>
>> IMO this can be left to implementations.  But I expect most server
>> implementations will calculate the tag value when it generates a key
>> pair and maintain it with the key pair.  Note that if the server
>> implementator and administrator don't care about the efficiency it
>> could even calculate the tag value for its all public keys and compare
>> it to the value specified in the "encryption key tag option".  Or it
>> could even skip using the key tag and try all possible keys.  It's
>> inefficient but will still work.
>>
> [LS]: Thanks a lot for your explanation. So we don't need to specify
> this implementation problem in our document.
>
> Best Regards,
> Lishan
>