Re: [icnrg] [irsg] Final IRSG poll on draft-irtf-icnrg-terminology-05

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 01 October 2019 14:09 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: icnrg@ietfa.amsl.com
Delivered-To: icnrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ACA512011F; Tue, 1 Oct 2019 07:09:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C3kiQeopDDgj; Tue, 1 Oct 2019 07:09:19 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8320A1200B5; Tue, 1 Oct 2019 07:09:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 166A1BE2E; Tue, 1 Oct 2019 15:09:16 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wXNntXVdS7-s; Tue, 1 Oct 2019 15:09:15 +0100 (IST)
Received: from [134.226.36.93] (unknown [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id C4D0EBDCF; Tue, 1 Oct 2019 15:09:15 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1569938955; bh=lcpGPmmDfJTP6+hx8KZ6vJKEndH+kOBRuVgiNr6mB/k=; h=To:Cc:References:From:Subject:Date:In-Reply-To:From; b=GGBcr4JBXrw7vdCc/VfMnGcZQP4xs1ajTrSckKDZbkShNCvbOi4w9Oowkr9hSbk+t 48QQSO8CBT/gAi18os5/CqtT+YjvykJeXkY4Zbv9LyGH64Rr0Jo1jx8WRHeHnspSfc EexUexTKR9+0YAw3/ixD75yToYeY20+Nq/PbkVDo=
To: "David R. Oran" <daveoran@orandom.net>, Internet Research Steering Group <irsg@irtf.org>, Colin Perkins <csp@csperkins.org>
Cc: ICNRG <icnrg@irtf.org>, draft-irtf-icnrg-terminology@ietf.org
References: <6D29C617-B033-47CE-B421-BABE76DC205B@csperkins.org> <d9e570c4-596e-93b1-9431-7a02b912aa8a@cs.tcd.ie> <EF23C8FC-D9C3-43E7-ADF9-002E9D639E84@orandom.net> <CBCF68D7-FFBA-4019-ABA7-D6B6B7A568C4@orandom.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=5BB5A6EA5765D2C5863CAE275AB2FAF17B172BEA; url=
Autocrypt: addr=stephen.farrell@cs.tcd.ie; prefer-encrypt=mutual; keydata= mQINBFo9UDIBEADUH4ZPcUnX5WWRWO4kEkHea5Y5eEvZjSwe/YA+G0nrTuOU9nemCP5PMvmh 5Cg8gBTyWyN4Z2+O25p9Tja5zUb+vPMWYvOtokRrp46yhFZOmiS5b6kTq0IqYzsEv5HI58S+ QtaFq978CRa4xH9Gi9u4yzUmT03QNIGDXE37honcAM4MOEtEgvw4fVhVWJuyy3w//0F2tzKr EMjmL5VGuD/Q9+G/7abuXiYNNd9ZFjv4625AUWwy+pAh4EKzS1FE7BOZp9daMu9MUQmDqtZU bUv0Q+DnQAB/4tNncejJPz0p2z3MWCp5iSwHiQvytYgatMp34a50l6CWqa13n6vY8VcPlIqO Vz+7L+WiVfxLbeVqBwV+4uL9to9zLF9IyUvl94lCxpscR2kgRgpM6A5LylRDkR6E0oudFnJg b097ZaNyuY1ETghVB5Uir1GCYChs8NUNumTHXiOkuzk+Gs4DAHx/a78YxBolKHi+esLH8r2k 4LyM2lp5FmBKjG7cGcpBGmWavACYEa7rwAadg4uBx9SHMV5i33vDXQUZcmW0vslQ2Is02NMK 7uB7E7HlVE1IM1zNkVTYYGkKreU8DVQu8qNOtPVE/CdaCJ/pbXoYeHz2B1Nvbl9tlyWxn5Xi HzFPJleXc0ksb9SkJokAfwTSZzTxeQPER8la5lsEEPbU/cDTcwARAQABtDJTdGVwaGVuIEZh cnJlbGwgKDIwMTcpIDxzdGVwaGVuLmZhcnJlbGxAY3MudGNkLmllPokCQAQTAQgAKgIbAwUJ CZQmAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCWj6jdwIZAQAKCRBasvrxexcr6o7QD/9m x9DPJetmW794RXmNTrbTJ44zc/tJbcLdRBh0KBn9OW/EaAqjDmgNJeCMyJTKr1ywaps8HGUN hLEVkc14NUpgi4/Zkrbi3DmTp25OHj6wXBS5qVMyVynTMEIjOfeFFyxG+48od+Xn7qg6LT7G rHeNf+z/r0v9+8eZ1Ip63kshQDGhhpmRMKu4Ws9ZvTW2ACXkkTFaSGYJj3yIP4R6IgwBYGMz DXFX6nS4LA1s3pcPNxOgrvCyb60AiJZTLcOk/rRrpZtXB1XQc23ZZmrlTkl2HaThL6w3YKdi Ti1NbuMeOxZqtXcUshII45sANm4HuWNTiRh93Bn5bN6ddjgsaXEZBKUBuUaPBl7gQiQJcAlS 3MmGgVS4ZoX8+VaPGpXdQVFyBMRFlOKOC5XJESt7wY0RE2C8PFm+5eywSO/P1fkl9whkMgml 3OEuIQiP2ehRt/HVLMHkoM9CPQ7t6UwdrXrvX+vBZykav8x9U9M6KTgfsXytxUl6Vx5lPMLi 2/Jrsz6Mzh/IVZa3xjhq1OLFSI/tT2ji4FkJDQbO+yYUDhcuqfakDmtWLMxecZsY6O58A/95 8Qni6Xeq+Nh7zJ7wNcQOMoDGj+24di2TX1cKLzdDMWFaWzlNP5dB5VMwS9Wqj1Z6TzKjGjru q8soqohwb2CK9B3wzFg0Bs1iBI+2RuFnxLkCDQRaPVAyARAA+g3R0HzGr/Dl34Y07XqGqzq5 SU0nXIu9u8Ynsxj7gR5qb3HgUWYEWrHW2jHOByXnvkffucf5yzwrsvw8Q8iI8CFHiTYHPpey 4yPVn6R0w/FOMcY70eTIu/k6EEFDlDbs09DtKcrsT9bmN0XoRxITlXwWTufYqUnmS+YkAuk+ TLCtUin7OdaS2uU6Ata3PLQSeM2ZsUQMmYmHPwB9rmf+q2I005AJ9Q1SPQ2KNg/8xOGxo13S VuaSqYRQdpV93RuCOzg4vuXtR+gP0KQrus/P2ZCEPvU9cXF/2MIhXgOz207lv3iE2zGyNXld /n8spvWk+0bH5Zqd9Wcba/rGcBhmX9NKKDARZqjkv/zVEP1X97w1HsNYeUFNcg2lk9zQKb4v l1jx/Uz8ukzH2QNhU4R39dbF/4AwWuSVkGW6bTxHJqGs6YimbfdQqxTzmqFwz3JP0OtXX5q/ 6D4pHwcmJwEiDNzsBLl6skPSQ0Xyq3pua/qAP8MVm+YxCxJQITqZ8qjDLzoe7s9X6FLLC/DA L9kxl5saVSfDbuI3usH/emdtn0NA9/M7nfgih92zD92sl1yQXHT6BDa8xW1j+RU4P+E0wyd7 zgB2UeYgrp2IIcfG+xX2uFG5MJQ/nYfBoiALb0+dQHNHDtFnNGY3Oe8z1M9c5aDG3/s29QbJ +w7hEKKo9YMAEQEAAYkCJQQYAQgADwUCWj1QMgIbDAUJCZQmAAAKCRBasvrxexcr6qwvD/9b Rek3kfN8Q+jGrKl8qwY8HC5s4mhdDJZI/JP2FImf5J2+d5/e8UJ4fcsT79E0/FqX3Z9wZr6h sofPqLh1/YzDsYkZDHTYSGrlWGP/I5kXwUmFnBZHzM3WGrL3S7ZmCYMdudhykxXXjq7M6Do1 oxM8JofrXGtwBTLv5wfvvygJouVCVe87Ge7mCeY5vey1eUi4zSSF1zPpR6gg64w2g4TXM5qt SwkZVOv1g475LsGlYWRuJV8TA67yp1zJI7HkNqCo8KyHX0DPOh9c+Sd9ZX4aqKfqH9HIpnCL AYEgj7vofeix7gM3kQQmwynqq32bQGQBrKJEYp2vfeO30VsVx4dzuuiC5lyjUccVmw5D72J0 FlGrfEm0kw6D1qwyBg0SAMqamKN6XDdjhNAtXIaoA2UMZK/vZGGUKbqTgDdk0fnzOyb2zvXK CiPFKqIPAqKaDHg0JHdGI3KpQdRNLLzgx083EqEc6IAwWA6jSz+6lZDV6XDgF0lYqAYIkg3+ 6OUXUv6plMlwSHquiOc/MQXHfgUP5//Ra5JuiuyCj954FD+MBKIj8eWROfnzyEnBplVHGSDI ZLzL3pvV14dcsoajdeIH45i8DxnVm64BvEFHtLNlnliMrLOrk4shfmWyUqNlzilXN2BTFVFH 4MrnagFdcFnWYp1JPh96ZKjiqBwMv/H0kw==
Message-ID: <9a5c62f0-2fdc-90af-6ea9-b12a23d2b381@cs.tcd.ie>
Date: Tue, 01 Oct 2019 15:09:15 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <CBCF68D7-FFBA-4019-ABA7-D6B6B7A568C4@orandom.net>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="E697ikdUzp2taylLKKxKKNaA0ldCyv3Et"
Archived-At: <https://mailarchive.ietf.org/arch/msg/icnrg/Nk--TOFQG6RCdAhVCepKU0bilAA>
Subject: Re: [icnrg] [irsg] Final IRSG poll on draft-irtf-icnrg-terminology-05
X-BeenThere: icnrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Information-Centric Networking research group discussion list <icnrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/icnrg>, <mailto:icnrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/icnrg/>
List-Post: <mailto:icnrg@irtf.org>
List-Help: <mailto:icnrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/icnrg>, <mailto:icnrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Oct 2019 14:09:24 -0000

Hi Dave,

On 01/10/2019 14:06, David R. Oran wrote:
> Stephen & IRSG,
> 
> Thanks for these insightful comments. It’s definitely not too late to
> improve the document! After giving this some time for others to weigh
> in I didn’t get any further thoughts from the other authors, so
> excuse the delay - please take a look and make any further
> suggestions for based on the stuff below.
> 
> Once we settle on the outstanding questions, I’ll update the draft
> and resubmit to hopefully finish the IRSG poll.
> 
> Thanks again for your time and effort on this!

No problem. And once again, as I'm late to this game,
I really do think it'd be fine to publish without my
comments being addressed. (If we can improve it anyway,
that's great, but I really don't want to try arm-wrestle
the RG into sharing my opinions:-)

> 
> DaveO.
> 
> On 23 Sep 2019, at 20:59, Stephen Farrell wrote:
> 
>> Hiya,
>> 
>> On 23/09/2019 23:12, Colin Perkins wrote:
>>> IRSG members,
>>> 
>>> This is to initiate a final IRSG poll on 
>>> draft-irtf-icnrg-terminology-05 with a deadline of 14 October
>>> 2019.
>> 
>> Given that I'm coming to the game very late, I am fine with a ready
>> to publish vote on this.
>> 
>> However, had I not been so late, I'd have said this was not ready
>> as I'm not sure that any of the cryptographic mechanism terms are
>> properly handled.
>> 
> Could you elaborate a bit on any stuff beyond the specifics in your
> comments (which we’ll try to address). We certainly don’t want to
> either cause confusion or be out of step with current usage.

There wasn't anything else, sorry, just the stuff below.

> 
>> In particular I wonder if data packet signatures are really checked
>> or not (with existing s/w)
> Given this is a terminology draft, there’s no assertion that the
> definitions are in fact satisfied by any given implementation. Since
> you are curious, here’s the state of affairs as I understand it:
> 
> - The current NDN code base does in fact check signatures. While it
> is possible for an application to directly access the
> transmit/receive interfaces for NDN messages and hence do its own
> signature verification, general applications use one of two APIs (the
> most comprehensive being the “producer/consumer API -
> https://named-data.net/publications/techreports/tr17-consumer-producer-api/)
> which automatically does the verification. - The current CCNx code
> base, Metis (https://github.com/parc-ccnx-archive/Metis) also
> verifies signatures automatically. - Of course, just checking
> signatures without some notion of which signatures should be trusted
> to sign which packets isn’t terribly helpful. There’s a lot of good
> work here on trust schemas and automatons that use the name
> structures of objects and keys to decide what to trust. If you’re
> interested take a look at “Schematizing Trust in Named Data
> Networking
> (https://named-data.net/publications/schematizing_trust_ndn/). This
> is also implemented and used in some current applications (for an
> interesting use case, check out the just-published paper Lessons
> Learned Building a Secure, Network Measurement Framework using Basic
> NDN
> (https://conferences.sigcomm.org/acm-icn/2019/proceedings/icn19-20.pdf)

Good to hear. Could be that the student was playing with
some other API.

> 
>> and have to consider the descriptions of confidentiality as being 
>> mythical. I'd say fixing those parts could well be considered an
>> inherent part of due diligence.
>> 
> Well, the current NDN and CCNx designs only provide origin
> authentication of packets and leaves confidentiality and payload
> encryption to a layer above. Given that this terminology is intended
> to only address the usage of terms in the specifications of the NDN
> and CCNx protocols, what would you suggest here? While the document
> does have wider interest than just the NDN/CCNx communities, its
> genesis and value is mostly in ensuring the that the two designs use
> consistent terminology so the different design decisions can be
> compared when doing evaluations and building applications.

Specific suggestions below, but in general, if no ICN
approach provides confidentiality then I'm not sure why
there need be any mention of "Encryption" in this draft.

> 
>> Detailed comments/suggestions below.
>> 
>> Cheers, S.
>> 
>> - abstract: is ICN still "novel"?
>> 
> Perhaps. A prior version of the document said “(ICN) is a new
> paradigm” and we changed it in -05. Would it be better to just say
> “paradigm”? I didn’t make any change to the text.

It's a nit:-)

> 
>> - intro: Is there really an intention to publish an equivalent for 
>> e.g.  NetInf? Be nice if there were, but it seems less likely now 
>> than perhaps when this effort started.
>> 
> Good point. We’ll change it to “may be the subject…”

Yep, that's likely better.

> 
>> - section 2: I refute the potential existence of an "irrefutable 
>> binding":-) Probably better to not use such odd language in a 
>> terminology draft? (In case someone wants to discuss, consider a 
>> DNSpionage type attack against a CA issuing certificates for use
>> in an ICN - doesn't matter if that'd be a hard or unlikely attack, 
>> it's enough that irrefutable is wrong.) Suggest s/irrefutable 
>> binding/strong cryptographic binding/
>> 
> I like your suggestion. We’ll make this change.

Cool.

> 
>> - s2: "Data authenticity and encryption" - hmm. Last time I asked
>> a student implementing ICN, he couldn't find any code that
>> actually enforced signature verification. Is that still the case?
>> If so, then it seems wrong to perpetuate a myth like this. If not -
>> great!
> See above in the answer to your general comment.

Good again that signatures are being checked. I still
wonder if it's reasonable to say that any node "can
validate" authenticity though - are forwarders really
able to do that with all data packets in practice? (Or
are the relevant signature-verification APIs only for
requestors?)

> 
>> And where can I find sample logs for mismatching interest and data 
>> packet caught via signature failure?
> I don’t know if there’s anything beyond debug logs for the code, but
> this question doesn’t seem in scope for a terminology document. Is it
> ok to just let this slide?

Sure:-)

> 
>> Secondly, the idea that it's fine and dandy that confidentiality
>> doesn't exist within ICN seems nicely 20th century.
> Well, it most certainly does exist, but not in the L3 protocol
> machinery which is what this document is addressing. Perhaps we
> should put something in the introduction to correctly position this
> as not claiming to be terminology for the whole protocol
> architecture, but only for the Layer 3 protocols of NDN and CCNx.
> Would that at least somewhat alleviate the concern?
> 
>> All in all that paragraph seems misleading.  I think the best fix
>> would be to make the description contingent, e.g. to say something
>> like "s/w could (but mostly doesn't) drop data packets that don't
>> match interests because of signature check failure." And maybe say
>> "there is no ICN confidentiality service (sadly)" if we want to be
>> clear.
>> 
> I get it, but the current text is not a statement about what an
> implementation does; it hopefully specifies the terminology used to
> describe it.

TBH, I still find it odd. FWIW, here's what I'd
suggest:

OLD:

   *Data Authenticity and Encryption*:

      Any data consumer and network element can validate the
      authenticity of a Data packet by verifying its cryptographic name-
      to-content binding.  In contrast, whether a Data packet's content
      (payload) itself is encrypted or not is irrelevant to the ICN
      network.  The use and management of content encryption keys is an
      application-layer concern.

NEW:

   *Data Authenticity*:

      Any data consumer and network element can (in principle)
      validate the authenticity of a Data packet by verifying
      its cryptographic name-to-content binding. Note that
      data authenticity is distinct from data trustworthiness,
      though the two concepts are related.  A packet is authentic
      if it has a valid name-to-content binding, but it may
      still be unwise to "trust" the content for any particular
      purpose.

Adding a sentence to the intro about confidentiality might
also be useful, e.g. "ICN architectures generally don't
provide data confidentiality, which is treated in ICN as
an application layer concern."

> 
>> - s2: "Trust" - meh. I don't trust text with such definitions. 
>> Also, a description of the concept of "Trust" that ends with "trust
>> model" seems circular. I'd just delete that para - it only 
>> obfuscates and doesn't help.
>> 
> I found the paragraph just fine, which probably says more about the
> authors’ naïveté than the actual state of affairs. I’d prefer to
> leave this or even better fix it, since it would be a possibly
> glaring omission to have a terminology document that doesn’t say
> anything about trust.

In my suggestion above, I include what I think is the correct
bit of that. While I still don't think a definition of "trust"
as an isolated term is useful, I guess including the current
term isn't the end of the world:-)

> 
>> - s2: "packet mule" - there is a "data mule" concept from DTN that 
>> may be what's meant here. I think using that term and referring to
>> something that defines it would be better than inventing the new 
>> term "packet mule." Later I find you even define the term "data 
>> mule" in 3.2 so just using that will be better.
>> 
> Actually, I think we are being sloppy, since this isn’t enough like
> the data mule concept in DTN to introduce here. Mules typically store
> forwarding state and instructions in the packets themselves, which
> is’t what NDN and CCNx do. So, thanks for catching this. I propose we
> change this to simply say “It can also behave as a store and forward
> node, carrying an interest or Data Packet for some time before
> forwarding it”.

That's better yes. (And thanks for the clarification, I hadn't
grokked the difference with DTN data mules myself.)

> 
>> - 3.1: "Data packet immutability" - I don't believe it myself:-)
>> If you hand me a packet, I can change and forward it. I think what 
>> you mean is that change can be detected (in principle).  I don't 
>> get the last sentence.
>> 
> I can see why this might be horribly confusing to somebody not
> “inside the ICN tent pissing out”. The idea which seems to not come
> across in the text is that ICN cares fundamentally about the
> relationship between names and data and in the case of NDN and CCNx
> makes the binding between a name and the corresponding data content
> immutable, with that binding enforced cryptographically. You
> therefore cannot, “reuse” as name to refer to a different set of
> bits. If this makes more sense to folks I can craft some modified
> language in the document. One caveat is that there is a political
> dimension to the definitions in the terminology draft, as it was the
> result of some delicate negotiation between the NDN and CCNx camps
> back some years ago when the two architectures were a lot different
> than they are today.

Ok. I'd suggest s/cannot change/cannot change without
likely being discarded/ maybe and s/is mutable/is
intended to be mutable/ - does that help?

> 
>> - 3.3: I was puzzled by the ordering of terms here. Why be coy 
>> about that? IOW, be good to explain to the reader why terms are in
>> this order. (My guess: to avoid forward refs.)
>> 
> Frankly I’m not sure what the particular motivation was. Since I
> doubt the usage model for this specification is to act as a
> “dictionary”, alphabetical or some other canonical ordering doesn’t
> seem to be important. Since you noticed, do you have some suggestion
> for what would be better? In some cases there is the advantage of no
> forward references, but in others it doesn’t seem to matter. I’m not
> proposing any change here.

Fair 'nuff, 'twas a nit:-)

> 
>> - 3.3: If there exists a useful definition of stateful forwarding, 
>> then why is there not one for stateless forwarding?
> Because stateless forwarding is not used anywhere in CCNx or NDN? It
> may be that anybody sufficiently clued knows that the “other”
> architecture is IP, which does stateless forwarding, and “everybody
> knows” what that is.
> 
>> If there is not then why is there not just forwarding? In which
>> case, why do we need an entry in 3.3?
>> 
> I think the reasoning is to tie the terminology directly to the form
> of the state that must be kept by a forwarder. Do you think this does
> in fact need fixing? I’d prefer to leave it as is.

I do wonder if there'll really be no stateless forwarding
if ICN grows, but fair enough.

> 
>> - 3.3: "data packet" ... the "and is directly secured" phrase - is 
>> that true? (See earlier.)
>> 
> Yes, I think so. Should we add “directly secured through
> cryptographic integrity mechanisms”?

That'd be better yes. I'd even go for s/integrity/signature/
(but see below).

> 
>> - 3.5: "name" ... the assertion of being "semantically meaningful" 
>> seems unnecessary to me and also impossible to verify. Maybe just 
>> delete the phrase as it's qualified with a "usually" anyway?
>> 
> I don’t think saying “usually semantically meaningful” is
> problematic, but we would not lose a lot by deleting it. I’d prefer
> to keep it given that there’s a lot of active work on name schemas
> for NDN and CCNx which do in fact delve deeply into structuring names
> that can be assigned meaning by applications, and in some cases,
> presented to users in UIs.

Ok.

> 
>> - 3.5: SHA256 probably calls for a reference.
>> 
> Will add. Thanks.
> 
>> - 3.5: "nonce" - this has a cryptographic definition that is 
>> perhaps not the same (see RFC4949). Saying that explicitly would be
>> good.
>> 
> Good point. As an aside CCNx does not use nonces, but NDN still does,
> although they don’t have as central a role in loop detection and
> retransmission as they used to now that NDN added a hop limit like
> CCNx has. Nevertheless we’ll add a note that the usage does not
> satisfy all the properties of a cryptographic nonce and add the
> reference to RFC4949.

Grand.

> 
>> - 3.7: "data integrity" also protects against deliberate 
>> modification, as well as corruption.
>> 
> Good point. Will add.
> 
>> - 3.7: "authenticity" - using HMAC? Really? That seems like a 
>> totally broken idea for an ICN. Surely any symmetric scheme like
>> that couldn't work with caching without allow forgery?
>> 
> It would be good if you could elaborate here. Anybody with the key
> can forge, including caches, so the implicit assumption is that the
> “trusted domain” includes the caches. Do you have a suggestion other
> than getting rid of mention of symmetric keying? 

Not really, sorry;-) It could be that I'm too out of date
with ICN, but I'd have thought that the authenticity
properties required signatures - with HMAC anyone with the
key can, as you say, muck with anything. I'm also not clear
what constitutes a "domain" for ICN - that is in fact the
only use of the term in the document. (And see earlier for
my allergy with "trusted":-)

> As an aside, we do
> have a TLS-like keying protocol for use cases that involve two-party
> exchanges - take a look at
> https://tools.ietf.org/id/draft-wood-icnrg-ccnxkeyexchange-01.html if
> you’re interested.

No time today sorry;-)

> 
>> - 3.7: all the "... confidentiality" paragraphs - this seems like 
>> it'd be better omitted given the utter lack of ways in which such a
>> service can be provided as part of an ICN.
> I’d prefer to leave this in, but appreciate the earlier comments
> about the protocols the terms apply to not having confidentiality
> machinery built in. Would it be acceptable to add to each of these a
> statement that the CCNx and NDN layer 3 protocols do not provide such
> confidentiality and it expected that higher layers provide such?

I guess. OTOH, defining terms for things-not-done seems odd
to me. To give an example, if there were some (higher layer)
scheme for confidentiality for interests and payloads that
might well require two signatures (one on plaintext one on
ciphertext) or some other new concept that isn't the same
as data authenticity as defined here, so I'm not sure it's
useful to define these terms here.

And again, just to re-emphasise - none of the above ought be
considered as me objecting to publication.

Cheers,
S.

> 
> 
> 
> DaveO
> 
> 
> _______________________________________________ icnrg mailing list 
> icnrg@irtf.org https://www.irtf.org/mailman/listinfo/icnrg
>