Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17

神明達哉 <jinmei@wide.ad.jp> Fri, 04 November 2016 17:09 UTC

Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3EFC61295D8 for <dhcwg@ietfa.amsl.com>; Fri, 4 Nov 2016 10:09:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id erph_UBzgBqY for <dhcwg@ietfa.amsl.com>; Fri, 4 Nov 2016 10:09:55 -0700 (PDT)
Received: from mail-qk0-x229.google.com (mail-qk0-x229.google.com [IPv6:2607:f8b0:400d:c09::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAB93129469 for <dhcwg@ietf.org>; Fri, 4 Nov 2016 10:09:54 -0700 (PDT)
Received: by mail-qk0-x229.google.com with SMTP id o68so105185661qkf.3 for <dhcwg@ietf.org>; Fri, 04 Nov 2016 10:09:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=676VQJcwHrdN2/ucnxfP1KhbPeMYTD5818KYCFZkNi4=; b=CviB+ZgBv0Ha2RUmhWfMQ5yphzCVz88+Z7z1WHKY1i9XXU7sS6SzRJmCRzITV+zlux WYqWZtQl4Buft9fCX9EvHnydwmG03tdw+YR+p7/RvxXNBHmYq9X82vawhnuDANSt1Yz5 TEm+KHFRd1MUQKEF27/5h/p72C5EBV8h9kI5H0VMCWDr9yeH+ix8Thf7IdFYrryewf4C LG+c4DI1oKm7Y+kEN0nRME8CAlsB3gYdUoDYMlv1xAe45UU4SsWJUly2NtQjF6yOxU0q AmSmM7VeGA+G23lAe7J405h/BmOp1lQNvDdEMGIlSbiTv4l567eIobFNvpVatXrzEZoq 78Pw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=676VQJcwHrdN2/ucnxfP1KhbPeMYTD5818KYCFZkNi4=; b=JrcY/E2w7HCHtEZrQ+ofSUmcvnQSVQcglxmiv4ZpLLP0IWtLL2BZ4nlBsiErXJBIVR TcEDLPnWRKMGRSY0mVY5HoWYAAsmTI0R75k90nKLZmGr0ujsTQnZcNOt8f+Bzs5I7EYb vBIVXNeaheyG4y9N/LfWCPjsHlHj4EHLnAFDAq2b0lsaVTy1+Y17slTmWr3pFTk3wUmd uFpTXv1HZsvt4tjiewnZKJPFJI+wWIxGlqlBUqq8RS4grxdbvrE6EerJpDHBohNUHl+c PAvHTn5szja27//to2pXGTw5iAVzhxP7Fg2KiuQ5+HrFdpJ9YB6AeYJ6hGzk+FfkUein WhkA==
X-Gm-Message-State: ABUngvdkfv4Ljoi+xeGCGamGOApIU1t6QpyNX+1W2Z9CAKbES3xtsKRP4qEDWII6pFigh2/G5m+5bBIW612Miw==
X-Received: by 10.55.74.21 with SMTP id x21mr13985815qka.46.1478279393927; Fri, 04 Nov 2016 10:09:53 -0700 (PDT)
MIME-Version: 1.0
Sender: jinmei.tatuya@gmail.com
Received: by 10.237.54.134 with HTTP; Fri, 4 Nov 2016 10:09:53 -0700 (PDT)
In-Reply-To: <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com>
References: <CAJE_bqebwr2WUUgaNgiYS4_8L77Gxj4Os+oPRG407B6ELMEhCQ@mail.gmail.com> <CAJ3w4Ndi5Gq63n5kZnanRhLM8nWE2wsWGh0kJJLJnq=VoXLuCg@mail.gmail.com> <CAJE_bqegh1DfWjfK2BxeC_fWa0cEk-KJNP0AT-TQuEa39w_wVQ@mail.gmail.com> <CAJ3w4NdM99nv4C19Xj=aosNme+_Ymyys=xQ3UWUfeZReZC4ckA@mail.gmail.com> <CAJE_bqdhGZnK16MooiyujDgthDNnR74EiwW0OevrN6uq4b4ANw@mail.gmail.com>
From: 神明達哉 <jinmei@wide.ad.jp>
Date: Fri, 04 Nov 2016 10:09:53 -0700
X-Google-Sender-Auth: pAjW-tNztBtk8zqOIiV_O2iIkkM
Message-ID: <CAJE_bqfKUZe2yaW1sAq7rrib0M7wz28HHtPLqCHK=vXcN6amgg@mail.gmail.com>
To: Lishan Li <lilishan48@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/pD4ZsvLukuJzG2KjJISpoGYu6vQ>
Cc: "dhcwg@ietf.org" <dhcwg@ietf.org>
Subject: Re: [dhcwg] preliminary comments on draft-ietf-dhc-sedhcpv6-17
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2016 17:09:56 -0000

On Fri, Nov 4, 2016 at 8:04 AM <jinmei@wide.ad.jp> wrote:

>> [LS]: I don't think that the client/server need to contain all the
>> supported
>> algorithms. In default, all the servers and clients support the mandatory
>> encryption, signature, hash algorithms. So the client/server may just
>> need to contain the preferred algorithms and some of mandatory
>> algorithms.
>
> I was probably not clear enough by "all the supported algorithms", but
> this is actually what I meant: all the preferred algorithms, and I
> thought it was wasteful.

To be a bit more specific, consider the following case:

Assume the server supports the following algorithms
  For Encryption: EM, E1
  For Signature: AM, A1, A2
  For Hash: HM, H1, H2
  (where EM, AM, HM are the mandatory algorithms)

Also assume algorithms for Ex and Ay are all completely different and
we need different public keys (thus different certificates) for all of
them.  And also assume we can use any combinations of Az and Hw to
construct the Signature option.  And suppose the server most prefers
E1, A2, H2 because these are the strongest, but it cannot assume a
particular client supports this combination.

Now, for the currently described protocol to work, the server will
need to include the following in response to the initial
Information-Request:

- Certificate for the public key for EM
- Certificate for the public key for E1
- Certificate for the public key for AM
- Certificate for the public key for A1
- Certificate for the public key for A2
- Signature using AM and HM
- Signature using AM and H1
- Signature using AM and H2
- Signature using A1 and HM
- Signature using A1 and H1
- Signature using A1 and H2
- Signature using A2 and HM
- Signature using A2 and H1
- Signature using A2 and H2

This is the (unavoidable) waste I'm envisioning in the current
protocol (or am I misunderstanding it?).

On the other hand, if we let the client tell the server supported
algorithms in Information-Request, the client will only have to show a
list of supported algorithm IDs.  For example, if the client supports
EM, E1, AM, A1, and HM, the client will only have to send an ID of
these 4 algorithms (10 octets in total).  These are all supported by
the server, so the server will return a Reply containing:

- Certificate for the public key for E1
- Certificate for the public key for A1
- Signature using A1 and HM

which (we assume) is the most preferred combination for the server,
and it's guaranteed the client understands it.

--
JINMEI, Tatuya