Re: [dtn-security] bundle security protocol changes...

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 06 December 2005 20:23 UTC

Received: from relay.imagine.ie (relay.imagine.ie [87.232.1.41]) by webbie.berkeley.intel-research.net (8.11.6/8.11.6) with ESMTP id jB6KNkg17472 for <dtn-security@mailman.dtnrg.org>; Tue, 6 Dec 2005 12:23:46 -0800
Received: from mail2.int.imagine.ie (mail2 [87.232.1.153]) by relay.imagine.ie (Postfix) with ESMTP id 240344075; Tue, 6 Dec 2005 20:23:45 +0000 (GMT)
Received: from [127.0.0.1] (dsl-102-234.cust.imagine.ie [87.232.102.234]) by mail2.int.imagine.ie (8.13.4/8.13.4/Debian-3) with ESMTP id jB6KNer1024359; Tue, 6 Dec 2005 20:23:43 GMT
Message-ID: <4395F319.4060405@cs.tcd.ie>
Date: Tue, 06 Dec 2005 20:22:49 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: dtn-security@mailman.dtnrg.org
CC: "Susan F. Symington" <susan@mitre.org>, Howard Weiss <hsw@sparta.com>
Subject: Re: [dtn-security] bundle security protocol changes...
References: <4395CF25.3060108@cs.tcd.ie> <20051206190244.GH3095@pisco.cs.berkeley.edu>
In-Reply-To: <20051206190244.GH3095@pisco.cs.berkeley.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Bayes-Prob: 0.0001 (Score 0)
X-Spam-Score: 0.00 () [Hold at 8.00]
X-Canit-Stats-ID: 139830 - ed9659af6a0c (trained as not-spam)
X-CanItPRO-Stream: outgoing
X-Scanned-By: CanIt (www . roaringpenguin . com) on 87.232.1.53
Sender: dtn-security-admin@mailman.dtnrg.org
Errors-To: dtn-security-admin@mailman.dtnrg.org
X-BeenThere: dtn-security@mailman.dtnrg.org
X-Mailman-Version: 2.0.13
Precedence: bulk
Reply-To: dtn-security@mailman.dtnrg.org
List-Unsubscribe: <http://mailman.dtnrg.org/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@mailman.dtnrg.org?subject=unsubscribe>
List-Id: DTN Security Discussion <dtn-security.mailman.dtnrg.org>
List-Post: <mailto:dtn-security@mailman.dtnrg.org>
List-Help: <mailto:dtn-security-request@mailman.dtnrg.org?subject=help>
List-Subscribe: <http://mailman.dtnrg.org/mailman/listinfo/dtn-security>, <mailto:dtn-security-request@mailman.dtnrg.org?subject=subscribe>
List-Archive: <http://mailman.dtnrg.org/pipermail/dtn-security/>

Hi Mike,

Michael Demmer wrote:
>>- Allow a header to follow the payload in order to carry
>>signatures and MACs. I think the easiest way to do that
>>is to just let it be defined per ciphersuite, so that e.g.
>>HMAC-in-front would be a different ciphersuite from
>>HMAC-at-the-end (which would require two BAH/PSH headers
>>in the bundle). Security result is therefore also
>>optional in an ASH and we add a bit to indicate its
>>presence.
> 
> Can you briefly explain why two BAH/PSH headers are required for the
> case where the sig/MAC follows the payload. This may be obvious but I
> don't get it.

So the ciphersuite is up-front, so a node with only small buffers can
still handle large bundles. Using the same header type before and
after is just one possible design, but seems simplest to me given
the way we'll be mixing multiple applications of security headers
later on.

> Also, just so we're on the same page, the rational for having the sig
> at the end is that you can start sending the payload bits before
> you've calculated the signature on the whole thing? As such you don't
> need to pull the whole payload into memory, generate the MAC, then
> send the MAC and send the payload?

Yes, exactly. Its for nodes with small buffers who handle large
bundles (or where scaling creates the same effect).

>>- Define a type for this header since its no longer
>>in the bundle spec. I guess '2' is fine? I don't think
>>an ASH needs an overall length since the flags and
>>thereafter individual optional fields each specify
>>their own lengths.
> 
> 
> But for implementations that don't include the security support, we
> need these headers to follow the standard header preamble (with
> length) so they can be skipped when processing the bundle.

Very true. And I'd forgotten about it. (Susan had also pointed
out that we need three different header values for BAH, PSH and CH
too.) Thanks for catching that.

[...]

> For the above points, I'm too far removed to understand all of what
> you're proposing to even begin to comment :)

Yep they're just abbreviated notes. Basically though what we want to
be able to eventually support is something a bit like a mixture of
s/mime's ability to forward encrypted mail adding a new signature
and a sequence of VPN tunnels. Clearly some ascii-art is needed.

Stephen.