Re: [Hipsec] HIP-based anycast

Julien Laganier <julien.ietf@gmail.com> Mon, 01 April 2013 01:17 UTC

Return-Path: <julien.ietf@gmail.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C329021F86BC for <hipsec@ietfa.amsl.com>; Sun, 31 Mar 2013 18:17:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.999
X-Spam-Level:
X-Spam-Status: No, score=-0.999 tagged_above=-999 required=5 tests=[BAYES_50=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPRXo6-ZoExB for <hipsec@ietfa.amsl.com>; Sun, 31 Mar 2013 18:17:09 -0700 (PDT)
Received: from mail-ve0-f178.google.com (mail-ve0-f178.google.com [209.85.128.178]) by ietfa.amsl.com (Postfix) with ESMTP id 20B7021F869C for <hipsec@ietf.org>; Sun, 31 Mar 2013 18:17:09 -0700 (PDT)
Received: by mail-ve0-f178.google.com with SMTP id db10so2073987veb.9 for <hipsec@ietf.org>; Sun, 31 Mar 2013 18:17:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=ihJQfiWeTHADPtE7ws9xdNwU2kMhswkqN3ndcvQQ0Yo=; b=XttMhIHiIKURonJUQk+CB/ceMMi/de6Kr3Wg7Vm9wVFsfJy/QydHVECgbTNjCjrevB ONjR6kTDtvWGpjbGA2Nd+kYLvTI+cjWNLl8K56MQ8QYvTG55bn3A+P07JEkMWLWs+UCG F35ar9z6QOW3pDopWYVRxm4JHh97dy3TQyv1Nmozkei91BkN1dRiH2h5j66NSw46vvr7 C0xGZ0GaSai/IEd+gAs4cMJdvb6c8KYcK74TMVLO9VoNh+LzT9RN+4N129hTVSldct7U HfYWwQ2AKXDGAinY4am5tAAsjvY+WMuEwK2MvbrZmkb+O+GuVh0UClMgtJqQyxEbYk1c ViFA==
MIME-Version: 1.0
X-Received: by 10.220.76.129 with SMTP id c1mr7784861vck.48.1364779028491; Sun, 31 Mar 2013 18:17:08 -0700 (PDT)
Received: by 10.52.17.207 with HTTP; Sun, 31 Mar 2013 18:17:08 -0700 (PDT)
In-Reply-To: <51574394.3070208@cs.hut.fi>
References: <50B48A1A.1080609@cs.hut.fi> <CAE_dhjv-7gg9RtY9-mGe5KSwU5gC7ucrMMiJ25o3Me4-XHUSWg@mail.gmail.com> <51574394.3070208@cs.hut.fi>
Date: Sun, 31 Mar 2013 18:17:08 -0700
Message-ID: <CAE_dhjv7hkgR+KFDfgkZSZz=CEBvbH7BfBim56FvVA0Gwm-UEQ@mail.gmail.com>
From: Julien Laganier <julien.ietf@gmail.com>
To: Miika Komu <mkomu@cs.hut.fi>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Cc: hip WG <hipsec@ietf.org>
Subject: Re: [Hipsec] HIP-based anycast
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2013 01:17:10 -0000

Hi Miika,

I don't think we're at a stage where it is feasible to retrofit
support for future extensions in the base HIP specifications.

As to the group key pair, it isn't shared on the server. The anycast
group controller holds the key pair, and uses it to derive the group
anycast HIT, and issue authorization certificates to group members who
own their own individual key pairs. SPKI authorization certificates
can be used for this purpose.

--julien

On Sat, Mar 30, 2013 at 12:57 PM, Miika Komu <mkomu@cs.hut.fi> wrote:
> Hi Julien,
>
> I'll have to the check the reference in more detail. Surely, shared private
> keys at the server side are certainly one possibility, but the compromise of
> a single host would then compromise the entire group?
>
> I was originally thinking that the IP address of rendezvous server would
> identify the group, but admit this can be somewhat limiting. For instance,
> an additional parameter in the I1 could identify the group. Clearly,
> multicast is outside of the scope of this WG, but I was considering if the
> specifications are future proof with such an approach since now the
> opportunistic base exchange is always terminated at the rendezvous server.
>
> P.S. I'll automatically assume this discussion shouldn't affect the specs at
> all if this topic doesn't gather too much discussion (and it's quite a late
> in process, anyway).
>
>
> On 03/29/2013 01:36 AM, Julien Laganier wrote:
>>
>> Hi,
>>
>> HIP anycast would need a HIT to identify the members of the anycast
>> group, wouldn't it?
>>
>> So why not have a key pair generated for the group, and the HIT
>> derived from the public key be the anycast HIT. One could then use the
>> group anycast key pair to sign authorization certificates granting
>> membership into the group. Similar concept has been explored for IPv6
>> multicast and anycast group in:
>>
>> CASTELLUCCIA, C. AND MONTENEGRO, G. 2003. Securing group management in
>> ipv6 with cryptographically
>> generated addresses. In The Eighth IEEE Symposium on Computers and
>> Communications
>> (ISCC’2003).
>>
>> --julien
>>
>>
>> On Tue, Nov 27, 2012 at 1:38 AM, Miika Komu <mkomu@cs.hut.fi> wrote:
>>>
>>> Hi,
>>>
>>> opportunistic mode with the help of a rendezvous server could be used for
>>> implementing HIP-based anycast. The current RVS specification does not
>>> allow
>>> this:
>>>
>>> http://tools.ietf.org/html/draft-ietf-hip-rfc5204-bis-02
>>>
>>> 4.3.1. Processing Outgoing I1 Packets
>>>
>>>     An initiator SHOULD NOT send an opportunistic I1 with a NULL
>>>     destination HIT to an IP address that is known to be a rendezvous
>>>     server address, unless it wants to establish a HIP association with
>>>     the rendezvous server itself and does not know its HIT.
>>>
>>> I think we could specify either a flag in the base exchange or
>>> alternatively
>>> a special HIT encoding for the "NULL" destination HIT in the I1. What do
>>> you
>>> think?
>>> _______________________________________________
>>> Hipsec mailing list
>>> Hipsec@ietf.org
>>> https://www.ietf.org/mailman/listinfo/hipsec
>>
>>
>