Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Mon, 07 November 2016 08:29 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FFB9129D33 for <dhcwg@ietfa.amsl.com>; Mon, 7 Nov 2016 00:29:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iyhq2cfxs8zY for <dhcwg@ietfa.amsl.com>; Mon, 7 Nov 2016 00:29:47 -0800 (PST)
Received: from mail-qk0-x22d.google.com (mail-qk0-x22d.google.com [IPv6:2607:f8b0:400d:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D666129D32 for <dhcwg@ietf.org>; Mon, 7 Nov 2016 00:29:47 -0800 (PST)
Received: by mail-qk0-x22d.google.com with SMTP id n21so56382748qka.3 for <dhcwg@ietf.org>; Mon, 07 Nov 2016 00:29:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=AT0PHjow/UVmdEyeptESfKFj0gdX4W6P7xS8IJ5x/jo=; b=aPjn9MLYw/qSgXXDGYh7otFItkzlmO43Pnc+OLemrODxwmZnujFhpI0ubRhjeXwCDS VLEwEJn/X84V2GoBILUlo0lQhnhsjn64qstgrRUmwCTsNh9Ja/hNxxzT5TiFklhMKv5v R9GLhiTaHwg95FprDoWvD71trVmSJhC73+89fd+3kzHT3rjYlfUbMDDk35sN71ma+3TN TmsiQX+aG0C5aFKpEDDIEYhzlEcmdrbU0GO+FHyYi3k3559XsFXDS8l75I7SMcEib+01 /psfwtHVOHI/drJlPjJGwiueOzZ3GYM1jwAfdIOBkVH5yba7T1Cl5sM20bVsRHUa0eWz Upwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=AT0PHjow/UVmdEyeptESfKFj0gdX4W6P7xS8IJ5x/jo=; b=NyUmtOdkmqIoUnid0UInC+Q3EhpEwOh8hHQGHxH8g5UID2r0Temvwun1alJZzDyHF+ iFjDV203Cfg0qs5tgr//Q8iKlycx4f7qG+BDqousfCjZYCulJyDEApO5FTYeidfYG/ZK 2k/lkK85OJhV1lBC5qKecwgZPNYwaaVnaSYKGeq0Cp7/x/LFxCpaMZeA+jJkeL2kLMgb /a6KZOTUVTjNb43pm11fnzIJCQXCkMxbZrMG2cnDG33C3IKfiAw6fK+78qyHYCe3KQJe sj8I2H9CiTyQt1jtC+i+FL+cQvFmQbGuM9PQM3WT129kVeewCl/vhM2MtmpdwjyoeyE3 5zcA==
X-Gm-Message-State: ABUngvcesRe4116oaBopgTUaM88zBuEBdmO0DkonXRFRwnwbBwTUAm7ykmKpMG3vZWMgI9x/hIErCP62FNRWow==
X-Received: by 10.55.38.80 with SMTP id y77mr5281882qkg.51.1478507386481; Mon, 07 Nov 2016 00:29:46 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Mon, 7 Nov 2016 00:29:45 -0800 (PST)
In-Reply-To: <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com> <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Mon, 07 Nov 2016 16:29:45 +0800
Message-ID: <CAJ3w4Nd3s+ZojjiotLkKwys6truhUgK6F-90UYjcpB9iw=fKKQ@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a11454c6c91b1600540b1d398"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/Ts7QeGtxeaxSYs8VCoqYQJPiFXI>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Nov 2016 08:29:49 -0000

Please see the question in line.

Best Regards,
Lishan

2016-11-05 1:09 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:

> On Fri, Nov 4, 2016 at 8:04 AM <jinmei@wide.ad.jp> wrote:
>
> >> [LS]: I don't think that the client/server need to contain all the
> >> supported
> >> algorithms. In default, all the servers and clients support the
> mandatory
> >> encryption, signature, hash algorithms. So the client/server may just
> >> need to contain the preferred algorithms and some of mandatory
> >> algorithms.
> >
> > I was probably not clear enough by "all the supported algorithms", but
> > this is actually what I meant: all the preferred algorithms, and I
> > thought it was wasteful.
>
> To be a bit more specific, consider the following case:
>
> Assume the server supports the following algorithms
>   For Encryption: EM, E1
>   For Signature: AM, A1, A2
>   For Hash: HM, H1, H2
>   (where EM, AM, HM are the mandatory algorithms)
>
> Also assume algorithms for Ex and Ay are all completely different and
> we need different public keys (thus different certificates) for all of
> them.  And also assume we can use any combinations of Az and Hw to
> construct the Signature option.  And suppose the server most prefers
> E1, A2, H2 because these are the strongest, but it cannot assume a
> particular client supports this combination.
>
> Now, for the currently described protocol to work, the server will
> need to include the following in response to the initial
> Information-Request:
>
> - Certificate for the public key for EM
> - Certificate for the public key for E1
> - Certificate for the public key for AM
> - Certificate for the public key for A1
> - Certificate for the public key for A2
> - Signature using AM and HM
> - Signature using AM and H1
> - Signature using AM and H2
> - Signature using A1 and HM
> - Signature using A1 and H1
> - Signature using A1 and H2
> - Signature using A2 and HM
> - Signature using A2 and H1
> - Signature using A2 and H2
>
> This is the (unavoidable) waste I'm envisioning in the current
> protocol (or am I misunderstanding it?).
>
> On the other hand, if we let the client tell the server supported
> algorithms in Information-Request, the client will only have to show a
> list of supported algorithm IDs.  For example, if the client supports
> EM, E1, AM, A1, and HM, the client will only have to send an ID of
> these 4 algorithms (10 octets in total).  These are all supported by
> the server, so the server will return a Reply containing:
>
> - Certificate for the public key for E1
> - Certificate for the public key for A1
> - Signature using A1 and HM
>
[LS]: In this way, we have two public key: public key for E1, and public
key for A1.
Which one will be used for the future encryption process?

>
> which (we assume) is the most preferred combination for the server,
> and it's guaranteed the client understands it.
>
>