Re: [manet] I-D Action:draft-ietf-manet-packetbb-sec-00.txt

Bo Berry <boberry@cisco.com> Tue, 22 June 2010 14:41 UTC

Return-Path: <boberry@cisco.com>
X-Original-To: manet@core3.amsl.com
Delivered-To: manet@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 512FE3A67DB for <manet@core3.amsl.com>; Tue, 22 Jun 2010 07:41:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level:
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 79mjgOd1ptNR for <manet@core3.amsl.com>; Tue, 22 Jun 2010 07:41:33 -0700 (PDT)
Received: from rtp-iport-2.cisco.com (rtp-iport-2.cisco.com [64.102.122.149]) by core3.amsl.com (Postfix) with ESMTP id 750403A698B for <manet@ietf.org>; Tue, 22 Jun 2010 07:41:32 -0700 (PDT)
Authentication-Results: rtp-iport-2.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAFpoIExAZnwM/2dsb2JhbACfF3Gma5pAgnSCJwQ
X-IronPort-AV: E=Sophos;i="4.53,460,1272844800"; d="scan'208";a="124307644"
Received: from rtp-core-1.cisco.com ([64.102.124.12]) by rtp-iport-2.cisco.com with ESMTP; 22 Jun 2010 14:41:39 +0000
Received: from dhcp-64-102-194-37.cisco.com (dhcp-64-102-194-37.cisco.com [64.102.194.37]) by rtp-core-1.cisco.com (8.13.8/8.14.3) with ESMTP id o5MEfdPC023023; Tue, 22 Jun 2010 14:41:39 GMT
Mime-Version: 1.0 (Apple Message framework v1078)
Content-Type: text/plain; charset="us-ascii"
From: Bo Berry <boberry@cisco.com>
In-Reply-To: <7BAC95F5A7E67643AAFB2C31BEE662D013D5C12487@SC-VEXCH2.marvell.com>
Date: Tue, 22 Jun 2010 10:41:40 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <C022FE79-29B1-4242-AC93-680A7BF258BA@cisco.com>
References: <20100620021504.7D1093A6834@core3.amsl.com> <C2120E0E-AB18-4709-BB45-0FF427F91243@cisco.com> <7BAC95F5A7E67643AAFB2C31BEE662D013D5C12487@SC-VEXCH2.marvell.com>
To: Paul Lambert <paul@marvell.com>
X-Mailer: Apple Mail (2.1078)
Cc: "manet@ietf.org" <manet@ietf.org>
Subject: Re: [manet] I-D Action:draft-ietf-manet-packetbb-sec-00.txt
X-BeenThere: manet@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Mobile Ad-hoc Networks <manet.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/manet>
List-Post: <mailto:manet@ietf.org>
List-Help: <mailto:manet-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/manet>, <mailto:manet-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Jun 2010 14:41:34 -0000

Paul

Since RFC5444 and the draft is meant to be a generic packeting framework, having greater flexibility should be the goal so the framework does not hinder a future design/need.  Multiple combinations does not imply that a specific implementation would support all the combos.  It is reasonable that an implementation may choose to support a single feature and error on everything else. 

As for MD5, I do not desire to use it but someone out there may have a real, acceptable need.

A different perspective.

-Bo

On Jun 21, 2010, at 7:25 PM, Paul Lambert wrote:

> 
> 
> Seems like a bad idea to have separate hash and signature values:
> 
>> The rationale for separating the hash function and the cryptographic
>   algorithm into two octets instead of having all combinations in a
>   single octet - possibly as TLV type extension - is twofold: First, if
>   further hash functions or cryptographic algorithms are added in the
>   future, the number space might not remain continuous.  More
>   importantly, the number space of 256 possible combinations would be
>   rapidly exhausted: 16 different hash functions and 16 different
>   cryptographic algorithms would lead to exhaustion.
> 
> Having multiple combinations is a bad idea.  It greatly complicates testing of devices since it leaves available many combinations.
> 
> The notion that 16 hash and 16 signature values would fill the number space is incorrect.  There is no reason to allow all of the combinations - only a few really make sense.
> 
> Similar comments for the parameters.  The overall security context needs to have a definition, but allowing parameterization complicates testing and leaves open room for downgrade attacks.
> 
> MD5 should NOT be included in the requested list of hash algorithms.
> 
> The cryptographic algorithm registry is poorly constructed and does not accommodate modes of operation (modes should not be a parameter)
> 
> This whole encapsulation seems generic and not specific to MANET.  Aren't there existing encapsulations that could be used?
> 
> Paul
> 
> 
> Paul A. Lambert | Marvell Semiconductor | +1 650-787-9141
> 
> 
>> -----Original Message-----
>> From: manet-bounces@ietf.org [mailto:manet-bounces@ietf.org] On Behalf Of
>> Bo Berry
>> Sent: Sunday, June 20, 2010 5:14 AM
>> To: manet@ietf.org
>> Subject: Re: [manet] I-D Action:draft-ietf-manet-packetbb-sec-00.txt
>> 
>> Ulrich, Thomas:
>> 
>> Below are a few points for consideration and discussion.
>> 
>> Regards
>> -Bo Berry
>> 
>> 
>> In section 10.2.2.  Hash Function suggest adding  SHA-128, SHA-256,
>> SHA-386, SHA-512 under SHA-2.
>> 
>> And in section 10.2.3.  Cryptographic Algorithm, suggest adding ECC.
>> 
>> As noted in section 5, "Before being able to validate a cryptographic
>> signature, routers have to exchange keys (e.g. public keys)."  Each
>> router (node) may have several keys (key ring). In this case, it would
>> be useful to define a key index TLVs.  The Key Index TLV would be
>> needed when multiple keys are used.
>> 
>> Also suggest breaking the <signature> TLV into separate TLVs to
>> increase flexibility and to align with the separate <timestamp> TLV.
>> Nodes may wish/need to configure the hash and crypto functions when
>> keys are configured and would not need to carry this info in the
>> signature TLV.
>> 
>> So we could define the following TLVs:
>> 
>>      <key-index TLV> := <key index value>
>>      <hash-function TLV> := <hash function identifier>
>>      <cryptographic-algorithm TLV> := <crypto-algor identifier>
>>      <signature-value TLV> := <signature value>
>> 
>> 
>> 
>> 
>> On Jun 20, 2010, at 4:41 AM, Ulrich Herberg wrote:
>> 
>>> I have submitted the packetbb-sec draft as WG draft. The draft does
>>> not contain any changes since the last individual draft
>>> (draft-herberg-manet-packetbb-sec-03). We will work on a new revision
>>> until the IETF meeting in Maastricht.
>>> 
>>> Best regards
>>> Ulrich
>> 
>>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>>> This draft is a work item of the Mobile Ad-hoc Networks Working Group of
>> the IETF.
>>> 
>>> 
>>> 	Title           : MANET Cryptographical Signature TLV Definition
>>> 	Author(s)       : U. Herberg, T. Clausen
>>> 	Filename        : draft-ietf-manet-packetbb-sec-00.txt
>>> 	Pages           : 17
>>> 	Date            : 2010-06-19
>>> 
>>> This document describes a general and flexible TLV (type-length-value
>>> structure) for representing cryptographic signatures as well as
>>> timestamps, using the generalized MANET packet/message format
>>> [RFC5444].  It defines two Packet TLVs, two Message TLVs, and two
>>> Address Block TLVs, for affixing cryptographic signatures and
>>> timestamps to a packet, message and address, respectively.
>>> 
>>> A URL for this Internet-Draft is:
>>> http://www.ietf.org/internet-drafts/draft-ietf-manet-packetbb-sec-00.txt
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> Below is the data which will enable a MIME compliant mail reader
>>> implementation to automatically retrieve the ASCII version of the
>>> Internet-Draft.
>>> <Mail Attachment>_______________________________________________
>>> manet mailing list
>>> manet@ietf.org
>>> https://www.ietf.org/mailman/listinfo/manet
>> 
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> manet mailing list
>> manet@ietf.org
>> https://www.ietf.org/mailman/listinfo/manet

----
boberry@cisco.com
This email may contain confidential and privileged material for the sole use of the intended recipient. This email may contain information that is protected by NDA. Any unauthorized review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.