Re: [karp] Karp Agenda 2: KeyStore?

"Polk, William T." <william.polk@nist.gov> Tue, 23 March 2010 02:29 UTC

Return-Path: <william.polk@nist.gov>
X-Original-To: karp@core3.amsl.com
Delivered-To: karp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 27AFA3A685B for <karp@core3.amsl.com>; Mon, 22 Mar 2010 19:29:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.329
X-Spam-Level:
X-Spam-Status: No, score=-0.329 tagged_above=-999 required=5 tests=[DNS_FROM_OPENWHOIS=2.431, RCVD_IN_DNSWL_MED=-4, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YyYGxDpGftsH for <karp@core3.amsl.com>; Mon, 22 Mar 2010 19:28:59 -0700 (PDT)
Received: from smtp.nist.gov (rimp2.nist.gov [129.6.16.227]) by core3.amsl.com (Postfix) with ESMTP id 1A82E3A6859 for <karp@ietf.org>; Mon, 22 Mar 2010 19:28:55 -0700 (PDT)
Received: from WSXGHUB1.xchange.nist.gov (wsxghub1.nist.gov [129.6.18.96]) by smtp.nist.gov (8.13.1/8.13.1) with ESMTP id o2N2R0in012219; Mon, 22 Mar 2010 22:27:00 -0400
Received: from MBCLUSTER.xchange.nist.gov ([fe80::d479:3188:aec0:cb66]) by WSXGHUB1.xchange.nist.gov ([2002:8106:1260::8106:1260]) with mapi; Mon, 22 Mar 2010 22:27:00 -0400
From: "Polk, William T." <william.polk@nist.gov>
To: Vishwas Manral <vishwas.ietf@gmail.com>, "Gregory M. Lebovitz" <gregory.ietf@gmail.com>
Date: Mon, 22 Mar 2010 22:31:32 -0400
Thread-Topic: [karp] Karp Agenda 2: KeyStore?
Thread-Index: AcrKFTlJMqrjcJtIQvCpT3Zq1NWhQgAG7nbs
Message-ID: <C7CD7614.14B5F%tim.polk@nist.gov>
In-Reply-To: <77ead0ec1003221612h7e7f24c8u4f0195aa3fec1b45@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-NIST-MailScanner: Found to be clean
X-NIST-MailScanner-From: william.polk@nist.gov
X-Mailman-Approved-At: Mon, 22 Mar 2010 22:30:31 -0700
Cc: Russ Housley <housley@vigilsec.com>, "Polk, William T." <william.polk@nist.gov>, "karp@ietf.org" <karp@ietf.org>
Subject: Re: [karp] Karp Agenda 2: KeyStore?
X-BeenThere: karp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion list for key management for routing and transport protocols <karp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/karp>
List-Post: <mailto:karp@ietf.org>
List-Help: <mailto:karp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/karp>, <mailto:karp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Mar 2010 02:29:00 -0000

Hi Vishwas,

Comments inline...

On 3/22/10 4:12 PM, "Vishwas Manral" <vishwas.ietf@gmail.com> wrote:

> Gregory/ Tim,
> 
> I agree with Gregory regarding having the presentation at the KARP meeting.
> 
> I scanned through the Polk draft. One comment is that the Long lived
> Crypto Keys stillneed to be changed manually.

Glad to have a reader!

Actually, the Long Lived Keys can be established manually *or* through an
Automated Key Management Protocol.  (See Figure 1 in
draft-polk-saag-rtg-auth-keytable-02).  This is a key concept for our draft
- the routing protocol need not know (or care) how long lived keys were
established.  This allows incremental introduction of automated key
management techniques seamlessly.

Removing keys from the document isn't covered, though.  Should it be added?
Expiration of entries is covered in draft-housley-saag-crypto-key-table-00,
but perhaps we need to discuss removal for other circumstances.  (I'm
thinking of severing a business relationship, or deciding a long lived key
has been compromised before its expiration date.)  I suspect that would be a
manual process...

> 
> Another comment is Session Acceptance diagram has a Key Id while the
> Session Initiation does not.

In our model, a session initiator is not concerned which long-lived key they
get, only that the key is shared with the right peer(s) and intended for use
with the right protocol.  So, the initiator's request for a key does not
contain a KeyID.

When a peer accepts a session, the initiator has already selected a
long-lived key.  The KeyID is essential in this case, or the peer will not
derive the right session key.

> 
> Some things to think of are what needs to be done when both sides
> initiate the connection at the same time.

Won't different protocols handle this differently?  I could envision ending
up with two parallel (but authenticated) sessions, or the protocol could
attempt to resolve this into a single connection by selecting one peer as
the "initiator" and discard the session key material from the aborted
session.

>                                           The document also does not
> talk about how the short term keys are changed.

The keytable does not force any key changes - it just lies there.
Generation of short term keys is entirely under the routing protocol's
control.

First and foremost, a new session means a new short term key. That may be
enough for some protocols.  For protocols with long-lived sessions, the
routing protocol can incorporate protocol specific mechanisms for changing
session keys during an existing session.

If these protocol specific mechanisms are designed such that the new session
keys are derived from different long lived keys, the peer initiating the
transition requests new keys just as if it was initiating a new session.
The other peer would behave as if it was accepting a new session...

We could add some text here if you would like.  (I think a brief reference
to tcp-ao's mechanism for changing keys during sessions is all we have now.)

Thanks,

Tim
> 
> Thanks,
> Vishwas
> 
> On Mon, Mar 22, 2010 at 2:38 PM, Gregory Lebovitz
> <gregory.ietf@gmail.com> wrote:
>> 
>> 
>> On Mon, Mar 22, 2010 at 2:35 PM, Polk, William T. <william.polk@nist.gov>
>> wrote:
>>> 
>>> Gregory,
>>> 
>>> There has really been no change to those documents since Hiroshima, so I
>>> did not suggest a presentation.  (We simply haven¹t received any suggestion
>>> to change them.)  I do have karp on my schedule and will be in the room.
>> 
>> I'll leave it to the chairs to decide. Since the last preso was a BoF, it
>> may make sense to do it again, if only to push people to read and review and
>> provide input.
>> 
>>> 
>>> I think that maintaining them as separate documents is advisable, given
>>> their simplicity...
>> 
>> If there is applicability outside of karp-framework, then I agree. If the
>> applicability is only w/in the karp-framework, then I'd suggest we suck it
>> into the "KeyStore" section of that document. But I haven't thought too much
>> about it until just now, sitting here with Bill Atwood, working on slides
>> and open issues / open sections.
>> Bill will have this as an open question on his slides and we can discuss in
>> WG. WFY?
>> Gregory
>> 
>>> 
>>> Thanks,
>>> 
>>> Tim
>>> 
>>> 
>>> On 3/22/10 2:11 PM, "Gregory M. Lebovitz" <gregory.ietf@gmail.com> wrote:
>>> 
>>> KARPies, Tim & Russ,
>>> I notice that the current agenda for KARP does NOT include a presentation
>>> by Tim/Russ on their documents that defines in more detail what
>>> draft-ietf-karp-framework calls the KeyStore. I'm thinking that would be a
>>> good thing to have presented again (it was presented at the BoF already
>>> once), because we need to decide if these become WG documents, or how to
>>> proceed them.
>>> 
>>> Those documents are:
>>> draft-housley-saag-crypto-key-table-01
>>> draft-polk-saag-rtg-auth-keytable-02
>>> 
>>> Another question is:  "Do these documents serve better as stand-alone, or
>>> ought they be incorporated into the karp-framework document"
>>> 
>>> Thoughts?
>>> 
>>> Gregory.
>> 
>> 
>> 
>> --
>> ----
>> IETF related email from
>> Gregory M. Lebovitz
>> Juniper Networks
>> 
>> _______________________________________________
>> karp mailing list
>> karp@ietf.org
>> https://www.ietf.org/mailman/listinfo/karp
>> 
>> 
>