Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis-01.txt
Tony Li <tli@cisco.com> Fri, 02 March 2007 23:25 UTC
Return-path: <isis-wg-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HNH8A-0001Vs-OT; Fri, 02 Mar 2007 18:25:42 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HNFLV-0000Sz-L8 for isis-wg@ietf.org; Fri, 02 Mar 2007 16:31:21 -0500
Received: from sj-iport-4.cisco.com ([171.68.10.86]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HNF4w-0004XU-Ru for isis-wg@ietf.org; Fri, 02 Mar 2007 16:14:21 -0500
Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-4.cisco.com with ESMTP; 02 Mar 2007 13:14:14 -0800
X-IronPort-AV: i="4.14,244,1170662400"; d="scan'208"; a="44679127:sNHT48288798"
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id l22LEEqx004080; Fri, 2 Mar 2007 13:14:14 -0800
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id l22LE7VE025146; Fri, 2 Mar 2007 13:14:14 -0800 (PST)
Received: from xfe-sjc-212.amer.cisco.com ([171.70.151.187]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Fri, 2 Mar 2007 13:14:12 -0800
Received: from [171.71.55.245] ([171.71.55.245]) by xfe-sjc-212.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Fri, 2 Mar 2007 13:14:12 -0800
In-Reply-To: <45E88174.7040208@ipinfusion.com>
References: <7993FE39-A603-4830-B63F-9615A38B3DEA@cisco.com> <45E88174.7040208@ipinfusion.com>
Mime-Version: 1.0 (Apple Message framework v752.3)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <5B7CE451-04FE-42EC-B786-8F952C3F8C0A@cisco.com>
Content-Transfer-Encoding: 7bit
From: Tony Li <tli@cisco.com>
Subject: Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis-01.txt
Date: Fri, 02 Mar 2007 13:14:10 -0800
To: Vishwas Manral <vishwas@ipinfusion.com>
X-Mailer: Apple Mail (2.752.3)
X-OriginalArrivalTime: 02 Mar 2007 21:14:12.0152 (UTC) FILETIME=[B9819B80:01C75D0F]
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=1840; t=1172870054; x=1173734054; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=tli@cisco.com; z=From:=20Tony=20Li=20<tli@cisco.com> |Subject:=20Re=3A=20[Isis-wg]=20draft-bhatia-manral-crypto-req-isis-01.tx t |Sender:=20; bh=mtWduJAJp4XMRRZe6hXfjleJPwuz1/SRypOFPIAygME=; b=m731yqIlZd1wls69sEqzmg75lp9mioWFXWXtJXpFjJ2HcP74NuBKGBQyJyPflyil1YzRPmYK fsUYJhv4rPP5/TrKsW8YW6leQJMVrYxW+bMQ/UsFPidRZETxMV9wgCe3;
Authentication-Results: sj-dkim-4; header.From=tli@cisco.com; dkim=pass (sig from cisco.com/sjdkim4002 verified; );
X-Spam-Score: 0.0 (/)
X-Scan-Signature: cab78e1e39c4b328567edb48482b6a69
Cc: isis-wg@ietf.org
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/isis-wg>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
Errors-To: isis-wg-bounces@ietf.org
On Mar 2, 2007, at 11:56 AM, Vishwas Manral wrote: > Collisions are however against the basic design of hash functions. Vishwas, Hashing functions necessarily produce collisions. The input to a hashing function is usually a set of bits that are a function of the packet being sent and some secret: f(secret, packet). f() is usually something simple, such as concatenation. The number of bits produced by f() is usually large, say on the order of 10,000. As an example a 1200 byte LSP is going to inject 9600 bits. The hashing function H(), then performs a transform: h = H(f(secret, packet)) where h is the hash result that we insert into the packet. The hashing function then takes these 10,000 bits and produces a much smaller result. In the case of HMAC-MD5, it's producing 128 bits. Simple combinatorics tells us that if you map 2^10,000 possible inputs to 2^128th possible results, on average, there will be many different inputs for any given output. Thus, collisions with a hashing function are *inevitable*. This does not make them insecure. Our purpose in using a hashing function is to provide authentication. We wish to ensure that an attacker cannot take an arbitrary packet P' and compute a similar hash without knowing the secret. Collision attacks do not give an attacker that capability. They do give the attacker the ability to compute some arbitrary packet P" that will result in the same hash value. Once again, injecting arbitrary packets P" is not a very interesting attack. You might as well just generate random packets and throw them at the system. Both will result in a DoS attack, but both should be rejected by the simple and straightforward integrity and syntactic checks of the protocol. Regards, Tony _______________________________________________ Isis-wg mailing list Isis-wg@ietf.org https://www1.ietf.org/mailman/listinfo/isis-wg
- [Isis-wg] draft-bhatia-manral-crypto-req-isis-01.… Tony Li
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Vishwas Manral
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Vishwas Manral
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Vishwas Manral
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Vishwas Manral
- RE: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Parker, Jeff
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Vishwas Manral
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Tony Li
- Re: [Isis-wg] draft-bhatia-manral-crypto-req-isis… Russ White