Re: [IPsec] Avoiding Authentication Header (AH)

Nico Williams <nico@cryptonector.com> Wed, 04 January 2012 20:13 UTC

Return-Path: <nico@cryptonector.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2165311E8088 for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 12:13:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.925
X-Spam-Level:
X-Spam-Status: No, score=-1.925 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VLGGphisVQTa for <ipsec@ietfa.amsl.com>; Wed, 4 Jan 2012 12:13:29 -0800 (PST)
Received: from homiemail-a72.g.dreamhost.com (caiajhbdccac.dreamhost.com [208.97.132.202]) by ietfa.amsl.com (Postfix) with ESMTP id 7881A11E8079 for <ipsec@ietf.org>; Wed, 4 Jan 2012 12:13:29 -0800 (PST)
Received: from homiemail-a72.g.dreamhost.com (localhost [127.0.0.1]) by homiemail-a72.g.dreamhost.com (Postfix) with ESMTP id 435F36B0078 for <ipsec@ietf.org>; Wed, 4 Jan 2012 12:13:29 -0800 (PST)
DomainKey-Signature: a=rsa-sha1; c=nofws; d=cryptonector.com; h=mime-version :in-reply-to:references:date:message-id:subject:from:to:cc :content-type:content-transfer-encoding; q=dns; s= cryptonector.com; b=EAtVPT6Dd18p5Yv62TOXTAXE4Lly1kJVbEGsHra/C/c8 Sv6gPRV4wT0zkfXcFg4t/YnYh5W5rz32mYIU0DmyNVkWXR3DnxTvraAEICv+LKpB 56WuD+iKtpSb4Ipq/ZFr869FchLc+iJJTS3/u2q2XT41UAe4M1CJ5ZkLoypYhGc=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=cryptonector.com; h= mime-version:in-reply-to:references:date:message-id:subject:from :to:cc:content-type:content-transfer-encoding; s= cryptonector.com; bh=mZvXdmgXD6z+tMRviJ/aQifVtVE=; b=eudTZjrNqOC NMOUKwGK3pUGwa+rsFcbj4ZA4zq2hyGrAVUvHDvv9hQ8pjUgvWt6dflbBeH8/kcI 41pKeY6QzVGrTMQufTfypoDDQvDEI/3QEVVQ0rR3LMLNA4I95U88sl6Bbbc4BLSp SoeATs4xDCbsjGvI5sVUzH8d5kijGQEU=
Received: from mail-pz0-f44.google.com (mail-pz0-f44.google.com [209.85.210.44]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: nico@cryptonector.com) by homiemail-a72.g.dreamhost.com (Postfix) with ESMTPSA id 2956D6B0014 for <ipsec@ietf.org>; Wed, 4 Jan 2012 12:13:29 -0800 (PST)
Received: by dajz8 with SMTP id z8so16582794daj.31 for <ipsec@ietf.org>; Wed, 04 Jan 2012 12:13:28 -0800 (PST)
MIME-Version: 1.0
Received: by 10.68.73.234 with SMTP id o10mr145601818pbv.90.1325708008778; Wed, 04 Jan 2012 12:13:28 -0800 (PST)
Received: by 10.68.10.234 with HTTP; Wed, 4 Jan 2012 12:13:28 -0800 (PST)
In-Reply-To: <48CB2A9F-D59C-462F-8C7A-82127A217703@gmail.com>
References: <12533D04-6B3F-490F-935B-4F1FA612C938@gmail.com> <7C362EEF9C7896468B36C9B79200D8350D027BB46F@INBANSXCHMBSA1.in.alcatel-lucent.com> <F1B15794-3291-4E71-BE26-A3559F408B01@gmail.com> <7C362EEF9C7896468B36C9B79200D8350D027BB484@INBANSXCHMBSA1.in.alcatel-lucent.com> <23AFA108-5B72-4CB0-8498-6CC27FC79F96@gmail.com> <CAA1nO734gfXYJLeLU9iYxoArPZJ3Xo3MsXy0Rt9zgoTciBCZbQ@mail.gmail.com> <CAK3OfOg0Gsxxf8T66XNVLHtR1Tk9yHFDGw96tr0UkEh6x5uYpQ@mail.gmail.com> <48CB2A9F-D59C-462F-8C7A-82127A217703@gmail.com>
Date: Wed, 04 Jan 2012 14:13:28 -0600
Message-ID: <CAK3OfOgx8+sDpBKDzoLWXY9TeoXnRJwTbsUXk-aVAELKZhEm1A@mail.gmail.com>
From: Nico Williams <nico@cryptonector.com>
To: RJ Atkinson <rja.lists@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Cc: IPsec ME WG List <ipsec@ietf.org>
Subject: Re: [IPsec] Avoiding Authentication Header (AH)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jan 2012 20:13:30 -0000

On Wed, Jan 4, 2012 at 5:39 AM, RJ Atkinson <rja.lists@gmail.com> wrote:
> On 04  Jan 2012, at 00:49 , Nico Williams wrote:
>> In 2012 the use of manually keyed unicast SAs with
>> group shared keys is not exactly impressive (because not scalable).
>
> Actually, that assumption is not valid.  There are
> multiple approaches to scalability available now.
>
> An obvious example is to use a KDC to distribute keys.

Out of curiosity, does such a protocol for keying SAs at end-points
and sharing the keys with routers/firewalls exist, and is it
implemented in any routers/firewalls?

Also, whether using an out-of-band provisioning system or a KDC, you
still have the problem that you need O(N^2) SAs to be pre-keyed (or,
if keyed dynamically, the middle-boxes need to be able to go fetch
keys dynamically unless they are the KDCs).  I can imagine a system
with static-static DH key exchange, with trusted middle-boxes knowing
the private DH keys.  A system with symmetric keying only would be
severely limited by the O(N^2) SA keying requirement, and would be
limited in applicability to VPN (including BITW) applications and
small end-to-end applications.

Nico
--