Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00

Ari Keranen <ari.keranen@nomadiclab.com> Mon, 01 March 2010 17:08 UTC

Return-Path: <ari.keranen@nomadiclab.com>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 84EAC28C472 for <hipsec@core3.amsl.com>; Mon, 1 Mar 2010 09:08:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IC-yHNqSnI0V for <hipsec@core3.amsl.com>; Mon, 1 Mar 2010 09:08:32 -0800 (PST)
Received: from gw.nomadiclab.com (unknown [IPv6:2001:14b8:400:101::2]) by core3.amsl.com (Postfix) with ESMTP id 313ED3A77D0 for <hipsec@ietf.org>; Mon, 1 Mar 2010 09:08:31 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by gw.nomadiclab.com (Postfix) with ESMTP id B0D5E4E6C5; Mon, 1 Mar 2010 19:08:31 +0200 (EET)
X-Virus-Scanned: amavisd-new at nomadiclab.com
Received: from gw.nomadiclab.com ([127.0.0.1]) by localhost (inside.nomadiclab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id khPUULmKkCZT; Mon, 1 Mar 2010 19:08:31 +0200 (EET)
Received: from [IPv6:2001:14b8:400:101:21c:23ff:fe45:a6c1] (unknown [IPv6:2001:14b8:400:101:21c:23ff:fe45:a6c1]) by gw.nomadiclab.com (Postfix) with ESMTP id 240124E67D; Mon, 1 Mar 2010 19:08:31 +0200 (EET)
Message-ID: <4B8BF48E.2060301@nomadiclab.com>
Date: Mon, 01 Mar 2010 19:08:30 +0200
From: Ari Keranen <ari.keranen@nomadiclab.com>
User-Agent: Thunderbird 2.0.0.23 (X11/20090817)
MIME-Version: 1.0
To: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>
References: <4B5F07F6.7080800@ericsson.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7C0@XCH-NW-10V.nw.nos.boeing.com> <4B83F243.6070208@nomadiclab.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7D1@XCH-NW-10V.nw.nos.boeing.com> <4B8689B0.50704@nomadiclab.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7FF@XCH-NW-10V.nw.nos.boeing.com> <4B877153.10908@nomadiclab.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A81E@XCH-NW-10V.nw.nos.boeing.com>
In-Reply-To: <7CC566635CFE364D87DC5803D4712A6C4C1F48A81E@XCH-NW-10V.nw.nos.boeing.com>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: HIP <hipsec@ietf.org>
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Mar 2010 17:08:33 -0000

Henderson, Thomas R wrote:
>> -----Original Message-----
>> From: Ari Keranen [mailto:ari.keranen@nomadiclab.com]
>> Sent: Thursday, February 25, 2010 11:00 PM
>> To: Henderson, Thomas R
>> Cc: 'Gonzalo Camarillo'; HIP
>> Subject: Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00
>>
>> Henderson, Thomas R wrote:
>>>>> When you say "In the other Peer ID mode, namely "RELOAD",..."
>>>>> which case do you mean?  Just the self-generated case?  If it is
>>>>> the centralized case, the Node IDs can't be used as HITs, and
>>>>> then the Node IDs and the HITs are not related to one another and
>>>>> need to be bound by some kind of certificate framework.  This is
>>>>> what I think section 5.6.1.1 of the base draft refers to.  Or am
>>>>> I misunderstanding something?
>>>> We mean both cases.  I'm sorry but I don't follow why couldn't the
>>>> non-ORCHID Node IDs be used as "HITs" (i.e., in the HIP header, VIA
>>>>  lists and certificates) in the centralized case?
>>>>
>>> Let's say that the enrollment server allocates the first node the
>>> Node ID of "0", the second node a Node ID of "1" etc.  Are you
>>> suggesting that these values are used as HITs?
>> Yes. Although the enrollment server would not really give IDs
>> like that
>> but rather make them cryptographically random, but the point
>> remains the
>> same: the IDs in the RELOAD mode are not (necessarily) hashes
>> of public
>> keys.
>>
>>> I raised this issue in another thread yesterday, but it seems to me
>>> that a central idea in the HIP architecture is that the HIT is the
>>> hash of the public key of a public/private key pair and
>> that the host
>>> holds the private key.  I don't believe we've talked before
>> about the
>>> possibility that the HI and HIT are not related cryptographically.
>> Yeah, we had a thread on the HIP list about this some half a year ago
>> but it died away. I admit that the HIT being a hash of a
>> public key is
>> somewhat central idea in HIP, but is it really necessary if
>> you have a
>> certificate that can provide the same binding between the
>> non-HIT-ID and
>> Host ID?
>>
>> AFAIK, you only lose the property that for someone else it's
>> really hard
>> to generate the same identity, but with an enrollment server
>> that would
>> not be a problem thanks to the certificates. Without an enrollment
>> server one could fake the ID in the RELOAD mode, but then you
>> can still
>> use the ORCHID mode and real HITs or generate IDs as digests
>> (SHA-1 or
>> SHA-256) of the public key as the RELOAD draft proposes.
>>
> 
> I think we should really explore this idea more but let's do so in the more RFC4423bis context as discussed in the other thread.  I wasn't objecting to the idea per se, but just that we should not slip it into this draft if it is not really recognized as a part of HIP today.

Actually, we used to have a milestone about this in the charter, but it 
was removed last July when the WG's conclusion was that transformations 
would be context specific. So, this already is recognized as part of the 
HIP today.

> I see pros and cons to non-ORCHID HITs:
> - pro:  can be designed to be hierarchical or formatted as needed.  Can they even be IPv6 addresses?
> - con:  HITs are no longer unique.  It is really the certificate which is the unique identifier.
> It does seem more flexible and may have deployment advantages.  Does it solve the ACL problem with current HITs (that they are non-aggregatable)?  It could lead to aggregatable HITs but then the ACL will need to know the authorizing enrollment server for those HITs, and check CERTs.

These questions are good to be explored on RFC4423bis, but we don't need 
the answers to proceed with the RELOAD instance spec, so I would not 
delay the instance spec by making it depend on RFC4423bis.

Anyhow, we are not changing anything fundamental in HIP, and having this 
property we can make HIP meet the different requirements that people 
building overlays have.


Cheers,
Ari