Re: [kitten] CAMMAC open issues

Jeffrey Hutzelman <jhutz@cmu.edu> Mon, 09 December 2013 18:17 UTC

Return-Path: <jhutz@cmu.edu>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DD4A1AE055 for <kitten@ietfa.amsl.com>; Mon, 9 Dec 2013 10:17:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TxfUXLKwpfV4 for <kitten@ietfa.amsl.com>; Mon, 9 Dec 2013 10:17:35 -0800 (PST)
Received: from smtp01.srv.cs.cmu.edu (smtp01.srv.cs.cmu.edu [128.2.217.200]) by ietfa.amsl.com (Postfix) with ESMTP id 8DE7A1AE041 for <kitten@ietf.org>; Mon, 9 Dec 2013 10:17:35 -0800 (PST)
Received: from [128.2.193.239] (minbar.fac.cs.cmu.edu [128.2.193.239]) (authenticated bits=0) by smtp01.srv.cs.cmu.edu (8.13.6/8.13.6) with ESMTP id rB9IHT5h012603 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO); Mon, 9 Dec 2013 13:17:29 -0500 (EST)
Message-ID: <1386613049.9407.149.camel@minbar.fac.cs.cmu.edu>
From: Jeffrey Hutzelman <jhutz@cmu.edu>
To: kitten@ietf.org
Date: Mon, 09 Dec 2013 13:17:29 -0500
In-Reply-To: <8939_1386355038_rB6IbHjk011550_alpine.GSO.1.10.1312061329390.27579@multics.mit.edu>
References: <ldvd2mcdx2s.fsf@cathode-dark-space.mit.edu> <8939_1386355038_rB6IbHjk011550_alpine.GSO.1.10.1312061329390.27579@multics.mit.edu>
Content-Type: text/plain; charset="UTF-8"
X-Mailer: Evolution 3.2.3-0ubuntu6
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0
X-Scanned-By: mimedefang-cmuscs on 128.2.217.200
Cc: jhutz@cmu.edu
Subject: Re: [kitten] CAMMAC open issues
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2013 18:17:37 -0000

On Fri, 2013-12-06 at 13:37 -0500, Benjamin Kaduk wrote:

> > Minor encoding change:
> >
> > Do we change "other-verifiers" from "[3] SEQUENCE OF Verifier" to
> > "[3] SEQUENCE (SIZE (1..MAX)) OF Verifier OPTIONAL"?
> >
> > I think we should do this because it would reduce the encoding size in
> > what I believe will be the common case of no additional verifiers.
> 
> That seems okay; we don't have any reason to expect an unbounded number of 
> other verifiers.  I'll let you pick the MAX, though.

I'm pretty sure MAX here is to be taken literally, not as a placeholder.
The change Tom proposes has no effect on the number of verifiers that
can be encoded, or on the encoding when at least one verifier is
present.  However, it reduces the encoding size by something like 4
octets when no verifiers are present.

-- Jeff