Re: [MBONED] Adoption Call: draft-jholland-mboned-ambi-04

"Manfredi (US), Albert E" <albert.e.manfredi@boeing.com> Mon, 09 March 2020 02:56 UTC

Return-Path: <albert.e.manfredi@boeing.com>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6167F3A0EDF for <mboned@ietfa.amsl.com>; Sun, 8 Mar 2020 19:56:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWa7ELUXHnwW for <mboned@ietfa.amsl.com>; Sun, 8 Mar 2020 19:56:27 -0700 (PDT)
Received: from clt-mbsout-01.mbs.boeing.net (clt-mbsout-01.mbs.boeing.net [130.76.144.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61D8D3A0ED8 for <mboned@ietf.org>; Sun, 8 Mar 2020 19:56:26 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 0292uNVO019926; Sun, 8 Mar 2020 22:56:24 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1583722584; bh=3QFInPRvXLpY4/NgNCOWPrXHiW6G+pwPoSE8zbsuUw8=; h=From:To:Subject:Date:References:In-Reply-To:From; b=KSL7TrsdqwLRpx17UnW3FyfhLl0gwLP3/eZpyMzr9TzSu4KEr7/Vo+JwvBO2a3vLJ WXReIhC0CMotbdErmjLKWOuCzBKNe13R6NVlEtwG2CGnuXyeyWeY1drM9tLuTe+3AK vj+6T5nbTvSvNUYwBD7vIcnHuCEy9dHmM5/wErynD8PO5wWAKBhZZfnzRw5uN/nxF4 P9zryIYXJHIjTGi+gbIW9kjTtm1EYFeOVUs5A0vU1cwASncjf2FA74gJPU+KWmOGOl UG7C9aYWUWKq5jEyouoFNLC1ywPH5CHCgwVX1YHqBa9s34UIlr8OzvtZmkNGRSVkef 6ibgPmVQmd4rA==
Received: from XCH16-01-12.nos.boeing.com (xch16-01-12.nos.boeing.com [144.115.66.70]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 0292uLE6019052 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Sun, 8 Mar 2020 22:56:21 -0400
Received: from XCH16-01-11.nos.boeing.com (144.115.66.39) by XCH16-01-12.nos.boeing.com (144.115.66.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.1913.5; Sun, 8 Mar 2020 19:56:20 -0700
Received: from XCH16-01-11.nos.boeing.com ([fe80::a96c:5d85:1337:4323]) by XCH16-01-11.nos.boeing.com ([fe80::a96c:5d85:1337:4323%4]) with mapi id 15.01.1913.005; Sun, 8 Mar 2020 19:56:20 -0700
From: "Manfredi (US), Albert E" <albert.e.manfredi@boeing.com>
To: "Holland, Jake" <jholland@akamai.com>, "mboned@ietf.org" <mboned@ietf.org>
Thread-Topic: [MBONED] Adoption Call: draft-jholland-mboned-ambi-04
Thread-Index: AQHV9Zaky/Sj+UOtYU2epv20XG6sMKg/baDggACRVoD//4vsoA==
Date: Mon, 09 Mar 2020 02:56:19 +0000
Message-ID: <6ba79ebab96145b78223f6d200e6c118@boeing.com>
References: <CABFReBqK8d=wYwDWzs64yFk_dB5U=tCOK90Tu3BffFAaxNf4OA@mail.gmail.com> <CAHANBtLDjzDbP=z-jjXEcJnY00dOLGV7_FC3_oQwDRa+QVYNUw@mail.gmail.com> <ad61bee9-ff3f-0ee3-ac28-11c9507e13d6@concordia.ca> <c1e2f1036a114153b981a676aafa788b@boeing.com> <F86DCB72-A098-4B6F-985A-A725D5B85F39@akamai.com>
In-Reply-To: <F86DCB72-A098-4B6F-985A-A725D5B85F39@akamai.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [144.115.204.6]
x-tm-snts-smtp: E5FDFB452F3CF638C562E1D413B1C3FBC8D0599A7A3E73B120D9C13E67A39B672000:8
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/dZkm6nHTjPSalgaEsifVMNsghcQ>
Subject: Re: [MBONED] Adoption Call: draft-jholland-mboned-ambi-04
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Mar 2020 02:56:39 -0000

-----Original Message-----
From: Holland, Jake <jholland@akamai.com> 

> For scale.  If you're sending full-sized (~1500-byte) multicast packets, the
authenticated manifest stream is only 1-3% of the data stream, so even with
unicast manifests you get a substantial benefit.

Thanks for the quick reply, Jake. Hmm. I get the packet size, but I thought that a manifest packet has to be sent for each multicast data packet? Is that wrong? That's the crux of my questioning. To me, the packets per unit time could become more of a scaling problem than packet size. This is what led me to believe that there is one manifest packet per data packet, although I admit, it's not 100% clear if this is the intention:

https://tools.ietf.org/html/draft-jholland-mboned-ambi-04

2.1.  Overview

   In order to authenticate a data packet, AMBI receivers need to hold
   these three pieces of information at the same time:

   o  the data packet; and

   o  an authenticated manifest containing the packet digest for the
      data packet; and

   o  a digest profile defining the transformation from the data packet
      to its packet digest.

   The manifests are delivered as a stream of manifests over an
   authenticated data channel.  Manifest contents MUST be authenticated
   before they can be used to authenticate data packets.

   The manifest stream is composed of an ordered sequence of manifests
   that each contain an ordered sequence of packet digests,
   corresponding to the original packets as sent from their origin, in
   the same order.

2.2.  Buffering and Validation Windows

   ... While holding a data packet, if the corresponding packet digest for
   that packet arrives in the manifest stream and can be authenticated,
   the data packet is authenticated.


>> Conversely, for authenticated or encrypted multicast traffic, is it not simpler to use a symmetric key stream cipher, with wide enough packet sequence numbers to permit the new secret key to be sent to all multicast group members, out of band, at a relatively low rate? If you can show that the sequence number never repeats, with a given secret key, you're done. Let's say, update the secret key daily, using any low data rate key exchange protocol.
>
> The problem with this is that the receivers do not trust each other, for instance
in a video broadcast scenario.

Good answer! My own solution, even in AMT, if this problem that receivers don't trust each other exists, is to filter every received multicast for the correct source IP address. It does make AMT more like SSM, however the filter is simple enough to implement, when security becomes a concern. I would think this approach is much more lightweight and direct, no?

Bert