[MBONED] ALTA draft posted

Kyle Rose <krose@krose.org> Tue, 09 July 2019 15:38 UTC

Return-Path: <krose@krose.org>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71EA512027B for <mboned@ietfa.amsl.com>; Tue, 9 Jul 2019 08:38:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.703
X-Spam-Level:
X-Spam-Status: No, score=-0.703 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, PDS_NO_HELO_DNS=1.295, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=krose.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VMEDI_vKfMoJ for <mboned@ietfa.amsl.com>; Tue, 9 Jul 2019 08:38:04 -0700 (PDT)
Received: from mail-yw1-xc2e.google.com (mail-yw1-xc2e.google.com [IPv6:2607:f8b0:4864:20::c2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C4D2120475 for <mboned@ietf.org>; Tue, 9 Jul 2019 08:38:04 -0700 (PDT)
Received: by mail-yw1-xc2e.google.com with SMTP id x140so3673616ywg.3 for <mboned@ietf.org>; Tue, 09 Jul 2019 08:38:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=krose.org; s=google; h=mime-version:from:date:message-id:subject:to; bh=Ic0pbVwRPbMRMPX0QXXrAfhGyLpSQRmH1ZKj2rWYd3Q=; b=pPpWPjGNGyBVLSPlmOU/LgJT4FZ7U6jY6rLAqwG9DRkynTfHaumJCFy5r3N14d+y9o uYtyDOWna1YSPUKBQdRDETf4+cMXK54F7mAvF9GC9/pTujy9l2nRpX/IyaZCi7uSDnNd swjo0oMCikCLWdWgQtNNKjChHjkaDkbqs3YBo=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=Ic0pbVwRPbMRMPX0QXXrAfhGyLpSQRmH1ZKj2rWYd3Q=; b=X9IyUNm/vWH0Pc3roW3VvqnbvuQ4Kgc+WAGbxMRbBlLQYMy1XLxSAFNsKFDNv43dZF C+MBEciDUsbGwqOTj6NNBgn7V1bUDS3J0/YdSgaF7h49uGizJjJt6z7kctk5EFLCCWrl YfIQWzrIhdD4Gf8vdlBP6Y6NVjT3AePdmTKj8Xk5m/irB+etOax4NXm2ROIZj6aLr+NH t8vZFlb94Z0ZI7joX+MnkHRg4NyWnqstx8YIappAPwKDgL89plEy3kFKOa+/mz8jSOTT +SUo+OSm+MAF8ayJkE9pxsEe2xSFgNywqem5GLS9PxFpNsqQqVyYtmj2n4I7yNkoqhlQ 5OjA==
X-Gm-Message-State: APjAAAWrK/uD0/UmzFnfVtXJXS2ejGdggjyWes572ovFlDit/Ugjda+g R/UgYVzj4Ao1IIKZgIXcOCzvzyVPBJeowM/DLRF81H7puzptgA==
X-Google-Smtp-Source: APXvYqxPwBAKMyuOEC6NA5n6Vx74cQWuCPsoMWKsJoGgSc297IBZ/MRm50AhaNSy1DhzvakpYHUIyvTUKbMpjujfZzI=
X-Received: by 2002:a0d:e1d7:: with SMTP id k206mr15148432ywe.229.1562686682873; Tue, 09 Jul 2019 08:38:02 -0700 (PDT)
MIME-Version: 1.0
From: Kyle Rose <krose@krose.org>
Date: Tue, 09 Jul 2019 11:37:51 -0400
Message-ID: <CAJU8_nVry86fzWDhnq0Ch=MfkiwUz+Ew9bgssbB1Nm8i8Lrpaw@mail.gmail.com>
To: mboned@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a0d53b058d415832"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/CRKp2O2eqJ7pI9hMkqy3SluLG-o>
Subject: [MBONED] ALTA draft posted
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 15:38:06 -0000

I've posted a new WIP draft for Asymmetric Loss-Tolerant Authentication to
the data tracker:

https://datatracker.ietf.org/doc/draft-krose-mboned-alta/

The GitHub repo is here:

https://github.com/squarooticus/alta

The abstract explains the basic idea:

q( This document introduces Asymmetric Loss-Tolerant Authentication (ALTA),
which employs an acyclic graph of message authentication codes (MACs)
transmitted alongside data payloads, with redundancy to enable
authentication of all received payloads in the presence of certain patterns
of loss, along with regularly paced digital signatures. ALTA requires no
time synchronization and enables authentication of payloads as soon as
sufficient authentication material has been received. )

It's unclear to me where this draft belongs, but I figured I'd start with
the SMEs for the target use-case, which is multicast streaming delivery,
and possibly go back to secdispatch if there's interest in pursuing
standardization of this protocol but a determination that it is
out-of-scope for mboned.

I would be happy to give a 10 minute overview in Montreal, if there's time.

Thanks,
Kyle