Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00

"Henderson, Thomas R" <thomas.r.henderson@boeing.com> Fri, 26 February 2010 17:27 UTC

Return-Path: <thomas.r.henderson@boeing.com>
X-Original-To: hipsec@core3.amsl.com
Delivered-To: hipsec@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5B7853A87FB for <hipsec@core3.amsl.com>; Fri, 26 Feb 2010 09:27:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.523
X-Spam-Level:
X-Spam-Status: No, score=-6.523 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VUi5xTnidP63 for <hipsec@core3.amsl.com>; Fri, 26 Feb 2010 09:27:21 -0800 (PST)
Received: from slb-smtpout-01.boeing.com (slb-smtpout-01.boeing.com [130.76.64.48]) by core3.amsl.com (Postfix) with ESMTP id 71D153A86DC for <hipsec@ietf.org>; Fri, 26 Feb 2010 09:27:21 -0800 (PST)
Received: from slb-av-01.boeing.com (slb-av-01.boeing.com [129.172.13.4]) by slb-smtpout-01.ns.cs.boeing.com (8.14.4/8.14.4/8.14.4/SMTPOUT) with ESMTP id o1QHTSBH004925 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 26 Feb 2010 09:29:28 -0800 (PST)
Received: from slb-av-01.boeing.com (localhost [127.0.0.1]) by slb-av-01.boeing.com (8.14.4/8.14.4/DOWNSTREAM_RELAY) with ESMTP id o1QHTSn7019033; Fri, 26 Feb 2010 09:29:28 -0800 (PST)
Received: from XCH-NWHT-01.nw.nos.boeing.com (xch-nwht-01.nw.nos.boeing.com [130.247.70.222]) by slb-av-01.boeing.com (8.14.4/8.14.4/UPSTREAM_RELAY) with ESMTP id o1QHTRVn019017 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=OK); Fri, 26 Feb 2010 09:29:28 -0800 (PST)
Received: from XCH-NW-10V.nw.nos.boeing.com ([130.247.25.83]) by XCH-NWHT-01.nw.nos.boeing.com ([130.247.70.222]) with mapi; Fri, 26 Feb 2010 09:29:27 -0800
From: "Henderson, Thomas R" <thomas.r.henderson@boeing.com>
To: 'Ari Keranen' <ari.keranen@nomadiclab.com>
Date: Fri, 26 Feb 2010 09:29:26 -0800
Thread-Topic: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00
Thread-Index: Acq2sUI2gMolbBcqQn+ISTeEAbfnDQAVk/eA
Message-ID: <7CC566635CFE364D87DC5803D4712A6C4C1F48A81E@XCH-NW-10V.nw.nos.boeing.com>
References: <4B5F07F6.7080800@ericsson.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7C0@XCH-NW-10V.nw.nos.boeing.com> <4B83F243.6070208@nomadiclab.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7D1@XCH-NW-10V.nw.nos.boeing.com> <4B8689B0.50704@nomadiclab.com> <7CC566635CFE364D87DC5803D4712A6C4C1F48A7FF@XCH-NW-10V.nw.nos.boeing.com> <4B877153.10908@nomadiclab.com>
In-Reply-To: <4B877153.10908@nomadiclab.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-tm-as-product-ver: SMEX-8.0.0.1181-6.000.1038-17216.005
x-tm-as-result: No--38.908000-8.000000-31
x-tm-as-user-approved-sender: No
x-tm-as-user-blocked-sender: No
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: HIP <hipsec@ietf.org>
Subject: Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Feb 2010 17:27:22 -0000

> -----Original Message-----
> From: Ari Keranen [mailto:ari.keranen@nomadiclab.com]
> Sent: Thursday, February 25, 2010 11:00 PM
> To: Henderson, Thomas R
> Cc: 'Gonzalo Camarillo'; HIP
> Subject: Re: [Hipsec] WGLC: draft-ietf-hip-reload-instance-00
>
> Henderson, Thomas R wrote:
> >>> When you say "In the other Peer ID mode, namely "RELOAD",..."
> >>> which case do you mean?  Just the self-generated case?  If it is
> >>> the centralized case, the Node IDs can't be used as HITs, and
> >>> then the Node IDs and the HITs are not related to one another and
> >>> need to be bound by some kind of certificate framework.  This is
> >>> what I think section 5.6.1.1 of the base draft refers to.  Or am
> >>> I misunderstanding something?
> >> We mean both cases.  I'm sorry but I don't follow why couldn't the
> >> non-ORCHID Node IDs be used as "HITs" (i.e., in the HIP header, VIA
> >>  lists and certificates) in the centralized case?
> >>
> >
> > Let's say that the enrollment server allocates the first node the
> > Node ID of "0", the second node a Node ID of "1" etc.  Are you
> > suggesting that these values are used as HITs?
>
> Yes. Although the enrollment server would not really give IDs
> like that
> but rather make them cryptographically random, but the point
> remains the
> same: the IDs in the RELOAD mode are not (necessarily) hashes
> of public
> keys.
>
> > I raised this issue in another thread yesterday, but it seems to me
> > that a central idea in the HIP architecture is that the HIT is the
> > hash of the public key of a public/private key pair and
> that the host
> > holds the private key.  I don't believe we've talked before
> about the
> > possibility that the HI and HIT are not related cryptographically.
>
> Yeah, we had a thread on the HIP list about this some half a year ago
> but it died away. I admit that the HIT being a hash of a
> public key is
> somewhat central idea in HIP, but is it really necessary if
> you have a
> certificate that can provide the same binding between the
> non-HIT-ID and
> Host ID?
>
> AFAIK, you only lose the property that for someone else it's
> really hard
> to generate the same identity, but with an enrollment server
> that would
> not be a problem thanks to the certificates. Without an enrollment
> server one could fake the ID in the RELOAD mode, but then you
> can still
> use the ORCHID mode and real HITs or generate IDs as digests
> (SHA-1 or
> SHA-256) of the public key as the RELOAD draft proposes.
>

I think we should really explore this idea more but let's do so in the more RFC4423bis context as discussed in the other thread.  I wasn't objecting to the idea per se, but just that we should not slip it into this draft if it is not really recognized as a part of HIP today.

I see pros and cons to non-ORCHID HITs:
- pro:  can be designed to be hierarchical or formatted as needed.  Can they even be IPv6 addresses?
- con:  HITs are no longer unique.  It is really the certificate which is the unique identifier.
It does seem more flexible and may have deployment advantages.  Does it solve the ACL problem with current HITs (that they are non-aggregatable)?  It could lead to aggregatable HITs but then the ACL will need to know the authorizing enrollment server for those HITs, and check CERTs.

- Tom