Re: [HOKEY] Review of draft-gaonkar-radext-erp-attrs-02.txt

"Dan Harkins" <dharkins@lounge.org> Fri, 11 January 2008 18:06 UTC

Return-path: <hokey-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1JDOHA-0000dJ-JE; Fri, 11 Jan 2008 13:06:40 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1JDOH8-0000WQ-L1 for hokey@ietf.org; Fri, 11 Jan 2008 13:06:38 -0500
Received: from colo.trepanning.net ([69.55.226.174]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1JDOH7-0001wn-QU for hokey@ietf.org; Fri, 11 Jan 2008 13:06:38 -0500
Received: from www.trepanning.net (localhost [127.0.0.1]) by colo.trepanning.net (Postfix) with ESMTP id 4EFFA1FA61FF; Fri, 11 Jan 2008 10:06:30 -0800 (PST)
Received: from 69.12.173.8 (SquirrelMail authenticated user dharkins@lounge.org) by www.trepanning.net with HTTP; Fri, 11 Jan 2008 10:06:30 -0800 (PST)
Message-ID: <3355.69.12.173.8.1200074790.squirrel@www.trepanning.net>
In-Reply-To: <4786C4F7.7030506@qualcomm.com>
References: <477D1029.2060502@deployingradius.com> <2069.69.12.173.8.1199475463.squirrel@www.trepanning.net> <477ED21D.9010301@qualcomm.com> <1608.69.12.173.8.1199495480.squirrel@www.trepanning.net> <C24CB51D5AA800449982D9BCB9032513C22802@NAEX13.na.qualcomm.com> <4062.69.12.173.8.1199655622.squirrel@www.trepanning.net> <C24CB51D5AA800449982D9BCB9032513C22A67@NAEX13.na.qualcomm.com> <47843CFD.3040900@deployingradius.com> <C24CB51D5AA800449982D9BCB9032513CF47ED@NAEX13.na.qualcomm.com> <4785467D.1050607@deployingradius.com> <C24CB51D5AA800449982D9BCB9032513CF486 9@NAEX13.na. qualcomm.com> <7105.216.31.249.246.1199927549.squirrel@www.trepanning.net> <C24CB51D5AA800449982D9BCB9032513CF488D@NAEX13.na.qualcomm.com> <4785DEDC.7070707@deployingradius.com> <47867277.3040206@qualcomm.com> <4095.69.12.173.8.1199995955.squirrel@www.trepanning.net> <478686B1.6090300@qualcomm.com> <4814.69.12.173.8.1200010568.squirrel@www.trepanning.net> <4786C4F7.7030506@qualcomm.com>
Date: Fri, 11 Jan 2008 10:06:30 -0800
Subject: Re: [HOKEY] Review of draft-gaonkar-radext-erp-attrs-02.txt
From: Dan Harkins <dharkins@lounge.org>
To: Lakshminath Dondeti <ldondeti@qualcomm.com>
User-Agent: SquirrelMail/1.4.8
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
X-Priority: 3 (Normal)
Importance: Normal
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: -0.0 (/)
X-Scan-Signature: 9a2be21919e71dc6faef12b370c4ecf5
Cc: hokey@ietf.org
X-BeenThere: hokey@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: HOKEY WG Mailing List <hokey.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/hokey>
List-Post: <mailto:hokey@ietf.org>
List-Help: <mailto:hokey-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/hokey>, <mailto:hokey-request@ietf.org?subject=subscribe>
Errors-To: hokey-bounces@ietf.org

  Hi Lakshminath,

On Thu, January 10, 2008 5:23 pm, Lakshminath Dondeti wrote:
> I will try to be positive Dan :).
>
> One of the reasons I point to the old discussions and consensus
> agreements is that we have a colorful history in the IETF in going over
> things again and again, not always to improve things.  We are also not
> really perfect in our designs either.  So I am not sure really the point
> in debating things endlessly.
>
> But, I respect your insight into protocol design.  You have done this
> longer than I have and perhaps we were all wrong in the key hierarchy
> design.

  Thank you for your kind words. But I don't actually think things were
all wrong necessarily. I had an understanding that the peer would need
to authenticate "the network". I had an understanding that a 3 party
protocol would be needed to ensure that. Therefore, in my mind at least,
a key hierarchy was needed.

  But I had an epiphany in Vancouver. The peer _doesn't care_ about
authenticating "the network". He just wants service. That being the case
he doesn't care if his network access credential (that blob-of-bits that
he proves possession of to obtain network access) is shared between the
distributed entities that comprise "the network". That being the case the
key hierarchy becomes an unnecessary complexity.

  When I described this epiphany to Russ and others it came out as one
of "enterprise" versus "service provider" but I really believe the
distinction is whether the peer requires authentication of the entity
it is connecting to. If it does then I strongly believe a 3 party protocol
is needed, and a key hierarchy thefore makes sense; if it doesn't then
you don't need a 3 party protocol and you don't need a key hierarchy.

  I remember asking you in Vancouver when you thought a 3 party protocol
would be needed in HOKEY. You said, "never".

>          So, let me try another way.  Here is what is needed from the
> EMSK hierarchy.
> * to be able to derive various usage specific keys from the EMSK (by the
> way the typo was the omission of the word "directly"; we don't want to
> use the EMSK directly for reauthentication;)

  Right, we don't want to use the EMSK for HOKEY. So we can derive a
HOKEY key. Specific for allowing the peer to do handoffs. He proves
possession of the HOKEY key and he gets network access.

> * deliver domain specific keys so the domain servers can do the same thing

  Deliver the HOKEY key to the servers through normal AAA mechanisms.

> So this makes the hierarchy
>
>                  EMSK
>                /   / \
>               /   /   \
>      USRK[1..n] DSRK1  DSRK2  ...           (derived as needed)
>                    /      \
>             DSUSRK[1..m1]  DSUSRK[1..m2]

  So this makes the hierarchy

                 EMSK
                   |
               HOKEY-KEY

> There are 2 levels in the key hierarchy.  The two reasons above explain
> the two levels.

  Well you want to derive usage specific keys. That is the reason for
this key hierarchy. And the need for these usage specific keys is....
Well one of them is for handoffs. There is no justification for a
multiplicity of them though. So we have a need for one "usage specific"
key derived from the EMSK. Let's call that the HOKEY-KEY and get rid of
a whole layer of this key hierarchy. Then this DSUSRK stuff is next.

> With the above hierarchy, the USRKs are never sent out.  If there is
> dispute in billing when the rMSK is derived solely from the USRK (rRK),
> then the operator would know that the error is not due to any
> EAP-related protocols or proxies for that matter.  Likewise, if there
> are repeated billing issues associated with VisitedOperator1 and there
> is end-to-end security in delivering DSRKs, then the operator can infer
> that there are issues associated with VisitedOperator1.  Now of course,
> when proxies are involved it is not so clear.  There are strategies to
> get around that too.  For instance, the operator may program the
> smartcard in the peer to maintain usage statistics and can fetch them
> when there are such issues.  In that case again, the operator may be
> able to make inferences about where the problem is.

  But this rRK business is from a different key hierarchy defined in a
different document, right? It's _below_ the whole EMSK-USRK-DSRK-DSUSRK
tree you drew above, right? So I don't really see how that justifies
all the cruft above it.

  regards,

  Dan.




_______________________________________________
HOKEY mailing list
HOKEY@ietf.org
https://www1.ietf.org/mailman/listinfo/hokey