Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

Lishan Li <lilishan48@gmail.com> Mon, 07 November 2016 07:00 UTC

Return-Path: <lilishan48@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F8C0129C04 for <dhcwg@ietfa.amsl.com>; Sun, 6 Nov 2016 23:00:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level:
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKiVCU2fEfc1 for <dhcwg@ietfa.amsl.com>; Sun, 6 Nov 2016 23:00:24 -0800 (PST)
Received: from mail-qk0-x231.google.com (mail-qk0-x231.google.com [IPv6:2607:f8b0:400d:c09::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC84C129BF9 for <dhcwg@ietf.org>; Sun, 6 Nov 2016 23:00:23 -0800 (PST)
Received: by mail-qk0-x231.google.com with SMTP id x190so163643015qkb.0 for <dhcwg@ietf.org>; Sun, 06 Nov 2016 23:00:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=rzRgIqCDv1NIepb0KNe7XZqzZV6CdpnjoFUyBq18s8U=; b=MMRIEbj0j7owEsEQygq4ndF+actz6328qNEbGGrqUt6ajaaSftclpSDsiOYc57tipW pzR9hCd5DFwQW6ynV08vlw7G5GKAGq+MICMYuP3xfG8hCFWPl6sglahTZIc4BlgrTo21 VvW210Y5JfO0JFGxn/fbvxHzPyxiiwkzttT50baG4arsCOGWgNG0/wOxMs57Ke1lDGC8 oekA8HPzqlqHrYZxaffjJpVcrfdP5YkflnON6F4EwLjRHHA1Lsx3hYnMU8uL6nKJS0QB qkyzR5UuR7OnFAGVXQGrxQEScT1g8TckQQhWslkexNjJzojjCFcLQmcOiSv1pqdaiQcO fVpg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=rzRgIqCDv1NIepb0KNe7XZqzZV6CdpnjoFUyBq18s8U=; b=ZpSQeTCuiQbuHVWM0En/Z8rSM7ES1Eh4kCLXPeSs2JNcixDOBUOc304KTD54XSB6OK 8sBveLREz9MGqJN+iSjsYZ5xhwjq4T8ZuPuLry0EaKTCTocTso9U8dCuc++H5Vg40vLk swkoO01waYwZPbQxKqHscrcCwC4/MA6YrBffdLdKsu3deF+oUk1goRAdnfJqseHSuSb+ spDRLJF+RtekNQfgQx4QF6rSE6nx9RkjNqPDSPoTflP1PStKP6WCRG5lBu5h8zq4GHtN cLae041q5Fyffa3yIvJ5fpT0K8ip1HyTeUnKu5nPSt04rJ8CwWZ27dzv0TL2JPDhdksD qE+Q==
X-Gm-Message-State: ABUngvfIXVdVcmNJwAhMAbHAVQkCAa04igquHu1b9TNOAJBZt1zYx95msotPZWWlzj0tWm3TBv21GmzodhLLow==
X-Received: by 10.55.43.29 with SMTP id r29mr5153969qkh.211.1478502022909; Sun, 06 Nov 2016 23:00:22 -0800 (PST)
MIME-Version: 1.0
Received: by 10.237.62.242 with HTTP; Sun, 6 Nov 2016 23:00:22 -0800 (PST)
In-Reply-To: <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com> <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com>
From: Lishan Li <lilishan48@gmail.com>
Date: Mon, 07 Nov 2016 15:00:22 +0800
Message-ID: <CAJ3w4Nd3MB23_XB1jTV21kwUz7Bj4pwKO-zn_skw_4Onk7+2mQ@mail.gmail.com>
To: 神明達哉 <jinmei@wide.ad.jp>
Content-Type: multipart/alternative; boundary="001a1147e8e4e012ad0540b093d5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/cWBwM41XgCvPR_1n6AsIxim1DsI>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Nov 2016 07:00:25 -0000

Hi, Jinmei,

Thanks a lot for your detailed explanation. Agree to what you said. Will
modify it according to your comments.

Best Regards,
Lishan

2016-11-05 1:09 GMT+08:00 神明達哉 <jinmei@wide.ad.jp>:

> On Fri, Nov 4, 2016 at 8:04 AM <jinmei@wide.ad.jp> wrote:
>
> >> [LS]: I don't think that the client/server need to contain all the
> >> supported
> >> algorithms. In default, all the servers and clients support the
> mandatory
> >> encryption, signature, hash algorithms. So the client/server may just
> >> need to contain the preferred algorithms and some of mandatory
> >> algorithms.
> >
> > I was probably not clear enough by "all the supported algorithms", but
> > this is actually what I meant: all the preferred algorithms, and I
> > thought it was wasteful.
>
> To be a bit more specific, consider the following case:
>
> Assume the server supports the following algorithms
>   For Encryption: EM, E1
>   For Signature: AM, A1, A2
>   For Hash: HM, H1, H2
>   (where EM, AM, HM are the mandatory algorithms)
>
> Also assume algorithms for Ex and Ay are all completely different and
> we need different public keys (thus different certificates) for all of
> them.  And also assume we can use any combinations of Az and Hw to
> construct the Signature option.  And suppose the server most prefers
> E1, A2, H2 because these are the strongest, but it cannot assume a
> particular client supports this combination.
>
> Now, for the currently described protocol to work, the server will
> need to include the following in response to the initial
> Information-Request:
>
> - Certificate for the public key for EM
> - Certificate for the public key for E1
> - Certificate for the public key for AM
> - Certificate for the public key for A1
> - Certificate for the public key for A2
> - Signature using AM and HM
> - Signature using AM and H1
> - Signature using AM and H2
> - Signature using A1 and HM
> - Signature using A1 and H1
> - Signature using A1 and H2
> - Signature using A2 and HM
> - Signature using A2 and H1
> - Signature using A2 and H2
>
> This is the (unavoidable) waste I'm envisioning in the current
> protocol (or am I misunderstanding it?).
>
> On the other hand, if we let the client tell the server supported
> algorithms in Information-Request, the client will only have to show a
> list of supported algorithm IDs.  For example, if the client supports
> EM, E1, AM, A1, and HM, the client will only have to send an ID of
> these 4 algorithms (10 octets in total).  These are all supported by
> the server, so the server will return a Reply containing:
>
> - Certificate for the public key for E1
> - Certificate for the public key for A1
> - Signature using A1 and HM
>
> which (we assume) is the most preferred combination for the server,
> and it's guaranteed the client understands it.
>
> --
> JINMEI, Tatuya
>