Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Mon, 14 November 2016 16:16 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C26A412987B for <dhcwg@ietfa.amsl.com>; Mon, 14 Nov 2016 08:16:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7LLIDGzyLttg for <dhcwg@ietfa.amsl.com>; Mon, 14 Nov 2016 08:16:43 -0800 (PST)
Received: from mail-qk0-x236.google.com (mail-qk0-x236.google.com [IPv6:2607:f8b0:400d:c09::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5B8D129879 for <dhcwg@ietf.org>; Mon, 14 Nov 2016 08:16:42 -0800 (PST)
Received: by mail-qk0-x236.google.com with SMTP id n204so101251243qke.2 for <dhcwg@ietf.org>; Mon, 14 Nov 2016 08:16:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=FqZV5zxR7HkFtkv2Px5HcyK/r5Nww+l+eZXMLTcaeXU=; b=WrvJjOsc02dyxKdFFMwtixjT9iv3I1GaSLOXCxsSfYgbwwnKLa/22LzXSlQWIhe9c7 86324IjzKglFntuMHIROUu7pXYDS/uSEIh4I2WBr/tVHsTTYCFW0pHwWp7o+vSph5Qg7 piBCQIeli4A1MRoAza4YJCCe8fF70GsEiPx9uqQaImjjao2mnioAA04JaMeVY+ZjcvIT RGKGUJnO9xDQ5NFr4iaVGVf7fC0btWk7wSfVV4nbRTh3KYVY96/QyBsx7fE6qJPhOCwc 5+frzQ4yWPy/rR1SFRf0D6KqOES1AmXf5Xxg7Lz39Tdk9PUgA/UdNZIEhqV/JqWABK1Z 2HoQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=FqZV5zxR7HkFtkv2Px5HcyK/r5Nww+l+eZXMLTcaeXU=; b=BO3jP/eZJPG0KhbfG6g6ykwl3t6YgSqdSnPoe++nkPs0f5NA/JAITPOt8/W6oygC6b 6L6RRvOkO/EjFcrXwDVXQyD3Map9tyHFLdWBCIRTmey1iMU9U5UFofuNzAIZvA6sgNNa RLisT9SZxhultfsyLdQ00PfRi/swNKy1ilvZ3VSfcdppcyGTetT6WXth4eBLckcnhqz6 gmDsAIexgFHD08PwQ/eQprx2DgwXtHQkXjspfwBflEsu3jG+xhvQJOje9f3lf39oFk5O DgTIdVf7KqsSlVsbd2T9OmXbwTSC34w60oIL+6eT/3YaJMU22Njiki5z16TDnf4Q7RB6 hMrg==
X-Gm-Message-State: ABUngvd2s780oqVCtO+DpYTLZxiIJcz8j2UzMjOTfIwyl5W6StZLersId6D1utMW/IanCKWu8mDWa36lklGLxQ==
X-Received: by 10.55.48.72 with SMTP id w69mr19509649qkw.320.1479140201811; Mon, 14 Nov 2016 08:16:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Mon, 14 Nov 2016 08:16:41 -0800 (PST)
In-Reply-To: <CAJ3w4NerRzHYsRqcUAkAjHX23PYVF4Jv0wKcd33vXRRg+-0EAQ@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com> <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com> <CAJ3w4Nd3s+ZojjiotLkKwys6truhUgK6F-90UYjcpB9iw=fKKQ@mail.gmail.com> <m2r36nuqvn.wl%jinmei.tatuya@gmail.com> <CAJ3w4NeuNYTrX4p5rtZ6UceD5ydQ-B-vY6aqQzxWnXsrDOEFEA@mail.gmail.com> <CAJE_bqdh-bgk7BHZJnaFFBr3PDj4ZnSSGeGNdQ70F7dv91iQrA@mail.gmail.com> <CAJ3w4NfU9PrC9a+MGnJ=Es1yir_asHB3p1=9GfxZZ0iSe+At+Q@mail.gmail.com> <CAJE_bqfRBYkrniWQ+vtPULTURnvyV792QNGvr8JhhZpGQ0MSdA@mail.gmail.com> <CAJ3w4NerRzHYsRqcUAkAjHX23PYVF4Jv0wKcd33vXRRg+-0EAQ@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Tue, 15 Nov 2016 00:16:41 +0800
Message-ID: <CAJ3w4NekPk0TuAZW_jmTDYQHd8JP3GsrA0qrKYrnyqSSk3qwxw@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a114908be4d59020541452a11"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/RcitXO4I8iqF24isrcSmkTx8cOA>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Nov 2016 16:16:45 -0000

2016-11-14 15:42 GMT+08:00 Lishan Li <lilishan48@gmail.com>:

> 2016-11-12 1:33 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:
>
>> At Thu, 10 Nov 2016 00:48:53 +0800,
>> Lishan Li <lilishan48@gmail.com> wrote:
>>
>> > > It'll be possible (and probably quite common) to share the same
>> > > certificate (public key) for both encryption and signature.  For
>> > > example, if we use RSA for encryption and RSASSA, it's quite likely
>> > > that we can use the same public key.  But, unless we impose an
>> > > explicit relationship between these two algorithms as part of the
>> > > protocol specification we cannot always assume that, so the protocol
>> > > itself should be generic so that it will work even if encryption and
>> > > signature algorithms are totally independent.  That's why I stated the
>> > > above example: "add a new field for the certificate option to specify
>> > > for which it's supposed to be used: encryption, authentication, or
>> > > both."
>> > >
>> > > Whether to impose such an "explicit relationship" is a different
>> > > question, btw.  I think that's certainly an option and can make the
>> > > spec simpler at the cost of making it less flexible, but that should
>> > > be discussed and described in the spec explicitly, instead of leaving
>> > > it as an implicit assumption.
>> > >
>> > [LS]: There are two types of certificate: one type is used for
>> encryption
>> > and authentication, which contains the public key for encryption
>> algorithm;
>> > another type is used for signature versification, which contains the
>> public
>> > key for signature algorithm. We can set one field for this. If the
>> field is
>> > zero, then it indicates the first type. If the field is 1, then it
>> > indicates the
>> > second type.
>>
>> There are THREE types of certificates:
>> - one type is used only for encryption, which contains the public key
>>   for the encryption algorithm
>> - another is used only for authentication, which contains the public
>>   key for the signature algorithm
>> - yet another is used both for encryption and authentication, which
>>   contains the public key for the encryption and signature algorithms.
>>
>> So...
>>
>> > We can set one field for this. If the field is
>> > zero, then it indicates the first type. If the field is 1, then it
>> > indicates the
>> > second type.
>>
>> ...if this is a proposal of adding a new field to the certificate
>> option, yes, I think that's one way forward except that there are
>> three types.
>>
>> Alternatively, we might add both an EA-id and SA-id fields to the
>> option:
>>
>>     0                   1                   2                   3
>>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |      OPTION_CERTIFICATE       |         option-len            |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |            EA-id              |            SA-id              |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>>    |                                                               |
>>    .                  Certificate List(variable length)            .
>>    |                                                               |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>> (I'm not sure if this has to be a list of certificates instead of one
>> certificate, but that's a different question).
>
>
>> And we can use a value of 0 for EA-id and SA-id to mean this
>> certificate is not supposed to be used for encryption and signature,
>> respectively.  (The combination of 0, 0 makes no sense so we should
>> probably prohibit the use of it explicitly).
>>
> [LS]: So, there is no need to define a new field. The EA-id and SA-id are
> used to identify the certificate type.
> And the certificate list field should be changed to certificate field. If
> multiple
> certificates are contained, then multiple certificate option is contained.
>
[LS]: In this way, the certificate option and Signature option all contain
the SA-id field. And the content of the two SA-ids are same.

>
>