Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18

神明達哉 <jinmei@wide.ad.jp> Wed, 07 May 2014 15:35 UTC

Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39D311A035C for <dhcwg@ietfa.amsl.com>; Wed, 7 May 2014 08:35:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.978
X-Spam-Level:
X-Spam-Status: No, score=-0.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RDkTiVZjKsd9 for <dhcwg@ietfa.amsl.com>; Wed, 7 May 2014 08:35:19 -0700 (PDT)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) by ietfa.amsl.com (Postfix) with ESMTP id EE2F31A02EA for <dhcwg@ietf.org>; Wed, 7 May 2014 08:35:18 -0700 (PDT)
Received: by mail-wg0-f48.google.com with SMTP id b13so1190165wgh.7 for <dhcwg@ietf.org>; Wed, 07 May 2014 08:35:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=yiP1OGQYbKAhxohJyK5SHTTvlWQlQiM/ZKOAnwImD90=; b=LW0Rk6nbJM++6/lNzmwKeL/8KFjWO7JnGyRHm0Lt5ILwisqa245Dj7JapIfKjXEsxA ALdZLNxFZSzt+zvJ5X5uy5sw8ef6rCRzwLvdOaIfL3tbYyD2rZoBq5h67eC/RA5dMZzd 2PF8s1jdkIP2rIS+1YBwSYQQToxZz/P3pxWK9dW5H+eohDrSsM4ezuC5fgxb7amG4dCS 8+TJUz550Yu4fv+sQQYMa3I8XvtiiW2cTKnN+4Tc8xtSE/xPt8wWN3LY/c4De/vVeN2I nmCsZUHJ3dGXfX7H4G+4airCFcRDPxX7ZNERyMAVVvk0csXNSTvY4lNcmP1S4YggV+Ia Yf+w==
MIME-Version: 1.0
X-Received: by 10.180.11.178 with SMTP id r18mr8463454wib.41.1399476914261; Wed, 07 May 2014 08:35:14 -0700 (PDT)
Sender: jinmei.tatuya@gmail.com
Received: by 10.194.3.14 with HTTP; Wed, 7 May 2014 08:35:14 -0700 (PDT)
In-Reply-To: <5D36713D8A4E7348A7E10DF7437A4B923AE43272@nkgeml512-mbx.china.huawei.com>
References: <535FEDAD.5010103@gmail.com> <CAJE_bqen37j5UCsKZj6syVyvk2Xed4V_xGp-t4xY8shjmS+H5g@mail.gmail.com> <5D36713D8A4E7348A7E10DF7437A4B923AE43272@nkgeml512-mbx.china.huawei.com>
Date: Wed, 07 May 2014 08:35:14 -0700
X-Google-Sender-Auth: odamYrwQCezgRHODcx1iFgomg3c
Message-ID: <CAJE_bqe75D7oRJq=XmjPR9Dfvu3-AcL8kF9Pkm3JEOVsyxhr5A@mail.gmail.com>
From: 神明達哉 <jinmei@wide.ad.jp>
To: Sheng Jiang <jiangsheng@huawei.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/V3-yswMSBBdJal-fgSZB2alDBlA
Cc: dhcwg <dhcwg@ietf.org>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 May 2014 15:35:20 -0000

At Tue, 6 May 2014 07:36:34 +0000,
Sheng Jiang <jiangsheng@huawei.com> wrote:

> >- In Section 6.2:
> >
> >   On the recipient that supports the leap of faith model, the number of
> >   cached public keys or unverifiable certificates MUST be limited in
> >   order to protect against resource exhaustion attacks.  If the
> >
> >  This is mainly concerned about servers, correct?  If so, I'm not
> >  sure how severe this "attacks" are; DHCP servers generally need to
> >  maintain some state for each client (unless that's stateless only
> >  server) and would naturally already have some limitation on that
> >  resource.  Shouldn't the general defense be enough for this
> >  particular resource, too?
>
> The "MUST" here seems not proper. Let us replace is with "MAY". It makes this point optional and should address your concern.

I don't think my main point is MUST vs MAY.  It's about a more
general point of authenticating messages from clients to servers:

- whether we really need (public key) authentication in that
  direction, and if we do, why

- also if we do, what's the commonly expected model of "trust anchor":
  leap of faith or use of CA or something else, and if it's more
  likely to be a weaker model like leap of faith (I suspect so, for
  the direction of clients to servers), whether the motivation (1st
  bullet) is worth the weaker security

- and, if it's more likely to rely on leap of faith, what kind of
  consideration is needed

The discussion on caching the public keys is just a part of the third
bullet.  What I'm missing in the current draft is more comprehensive
and higher level discussions on all of these points.  It's far from
obvious to me compared to authenticating messages from servers to
clients.

--
JINMEI, Tatuya