[MBONED] ALTA draft posted
Kyle Rose <krose@krose.org> Tue, 09 July 2019 15:38 UTC
Return-Path: <krose@krose.org>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71EA512027B for <mboned@ietfa.amsl.com>; Tue, 9 Jul 2019 08:38:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.703
X-Spam-Level:
X-Spam-Status: No, score=-0.703 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, PDS_NO_HELO_DNS=1.295, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=krose.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VMEDI_vKfMoJ for <mboned@ietfa.amsl.com>; Tue, 9 Jul 2019 08:38:04 -0700 (PDT)
Received: from mail-yw1-xc2e.google.com (mail-yw1-xc2e.google.com [IPv6:2607:f8b0:4864:20::c2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C4D2120475 for <mboned@ietf.org>; Tue, 9 Jul 2019 08:38:04 -0700 (PDT)
Received: by mail-yw1-xc2e.google.com with SMTP id x140so3673616ywg.3 for <mboned@ietf.org>; Tue, 09 Jul 2019 08:38:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=krose.org; s=google; h=mime-version:from:date:message-id:subject:to; bh=Ic0pbVwRPbMRMPX0QXXrAfhGyLpSQRmH1ZKj2rWYd3Q=; b=pPpWPjGNGyBVLSPlmOU/LgJT4FZ7U6jY6rLAqwG9DRkynTfHaumJCFy5r3N14d+y9o uYtyDOWna1YSPUKBQdRDETf4+cMXK54F7mAvF9GC9/pTujy9l2nRpX/IyaZCi7uSDnNd swjo0oMCikCLWdWgQtNNKjChHjkaDkbqs3YBo=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=Ic0pbVwRPbMRMPX0QXXrAfhGyLpSQRmH1ZKj2rWYd3Q=; b=X9IyUNm/vWH0Pc3roW3VvqnbvuQ4Kgc+WAGbxMRbBlLQYMy1XLxSAFNsKFDNv43dZF C+MBEciDUsbGwqOTj6NNBgn7V1bUDS3J0/YdSgaF7h49uGizJjJt6z7kctk5EFLCCWrl YfIQWzrIhdD4Gf8vdlBP6Y6NVjT3AePdmTKj8Xk5m/irB+etOax4NXm2ROIZj6aLr+NH t8vZFlb94Z0ZI7joX+MnkHRg4NyWnqstx8YIappAPwKDgL89plEy3kFKOa+/mz8jSOTT +SUo+OSm+MAF8ayJkE9pxsEe2xSFgNywqem5GLS9PxFpNsqQqVyYtmj2n4I7yNkoqhlQ 5OjA==
X-Gm-Message-State: APjAAAWrK/uD0/UmzFnfVtXJXS2ejGdggjyWes572ovFlDit/Ugjda+g R/UgYVzj4Ao1IIKZgIXcOCzvzyVPBJeowM/DLRF81H7puzptgA==
X-Google-Smtp-Source: APXvYqxPwBAKMyuOEC6NA5n6Vx74cQWuCPsoMWKsJoGgSc297IBZ/MRm50AhaNSy1DhzvakpYHUIyvTUKbMpjujfZzI=
X-Received: by 2002:a0d:e1d7:: with SMTP id k206mr15148432ywe.229.1562686682873; Tue, 09 Jul 2019 08:38:02 -0700 (PDT)
MIME-Version: 1.0
From: Kyle Rose <krose@krose.org>
Date: Tue, 09 Jul 2019 11:37:51 -0400
Message-ID: <CAJU8_nVry86fzWDhnq0Ch=MfkiwUz+Ew9bgssbB1Nm8i8Lrpaw@mail.gmail.com>
To: mboned@ietf.org
Content-Type: multipart/alternative; boundary="000000000000a0d53b058d415832"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/CRKp2O2eqJ7pI9hMkqy3SluLG-o>
Subject: [MBONED] ALTA draft posted
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 15:38:06 -0000
I've posted a new WIP draft for Asymmetric Loss-Tolerant Authentication to the data tracker: https://datatracker.ietf.org/doc/draft-krose-mboned-alta/ The GitHub repo is here: https://github.com/squarooticus/alta The abstract explains the basic idea: q( This document introduces Asymmetric Loss-Tolerant Authentication (ALTA), which employs an acyclic graph of message authentication codes (MACs) transmitted alongside data payloads, with redundancy to enable authentication of all received payloads in the presence of certain patterns of loss, along with regularly paced digital signatures. ALTA requires no time synchronization and enables authentication of payloads as soon as sufficient authentication material has been received. ) It's unclear to me where this draft belongs, but I figured I'd start with the SMEs for the target use-case, which is multicast streaming delivery, and possibly go back to secdispatch if there's interest in pursuing standardization of this protocol but a determination that it is out-of-scope for mboned. I would be happy to give a 10 minute overview in Montreal, if there's time. Thanks, Kyle
- [MBONED] ALTA draft posted Kyle Rose