Re: [pcp] Posted auth req slide that was edited during meeting

<yoshihiro.ohba@toshiba.co.jp> Sat, 16 March 2013 19:52 UTC

Return-Path: <yoshihiro.ohba@toshiba.co.jp>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC6D721F87BB for <pcp@ietfa.amsl.com>; Sat, 16 Mar 2013 12:52:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.089
X-Spam-Level:
X-Spam-Status: No, score=-4.089 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UIZKqRyPUJw1 for <pcp@ietfa.amsl.com>; Sat, 16 Mar 2013 12:52:41 -0700 (PDT)
Received: from imx2.toshiba.co.jp (inet-tsb5.toshiba.co.jp [202.33.96.24]) by ietfa.amsl.com (Postfix) with ESMTP id DDCC721F87BA for <pcp@ietf.org>; Sat, 16 Mar 2013 12:52:40 -0700 (PDT)
Received: from tsbmgw-mgw02.tsbmgw-mgw02.toshiba.co.jp ([133.199.200.50]) by imx2.toshiba.co.jp with ESMTP id r2GJqcf0014250 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 17 Mar 2013 04:52:38 +0900 (JST)
Received: from tsbmgw-mgw02 (localhost [127.0.0.1]) by tsbmgw-mgw02.tsbmgw-mgw02.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2GJqcXT018937; Sun, 17 Mar 2013 04:52:38 +0900
Received: from localhost ([127.0.0.1]) by tsbmgw-mgw02 (JAMES SMTP Server 2.3.1) with SMTP ID 311; Sun, 17 Mar 2013 04:52:38 +0900 (JST)
Received: from arc1.toshiba.co.jp ([133.199.194.235]) by tsbmgw-mgw02.tsbmgw-mgw02.toshiba.co.jp (8.13.8/8.14.5) with ESMTP id r2GJqcDC018934; Sun, 17 Mar 2013 04:52:38 +0900
Received: (from root@localhost) by arc1.toshiba.co.jp id r2GJqc4J028612; Sun, 17 Mar 2013 04:52:38 +0900 (JST)
Received: from unknown [133.199.192.144] by arc1.toshiba.co.jp with ESMTP id EAA28611; Sun, 17 Mar 2013 04:52:38 +0900
Received: from mx2.toshiba.co.jp (localhost [127.0.0.1]) by ovp2.toshiba.co.jp with ESMTP id r2GJqcpG025045; Sun, 17 Mar 2013 04:52:38 +0900 (JST)
Received: from tgxml329.toshiba.local by toshiba.co.jp id r2GJqcJ4010324; Sun, 17 Mar 2013 04:52:38 +0900 (JST)
Received: from TGXML337.toshiba.local ([169.254.3.243]) by tgxml329.toshiba.local ([133.199.60.16]) with mapi id 14.02.0328.009; Sun, 17 Mar 2013 04:52:37 +0900
From: yoshihiro.ohba@toshiba.co.jp
To: hartmans@painless-security.com, alper.yegin@yegin.org
Thread-Topic: [pcp] Posted auth req slide that was edited during meeting
Thread-Index: AQHOInQ2ZVo7fOcKTKW7xX5uXeSScpios9bg
Date: Sat, 16 Mar 2013 19:52:37 +0000
Message-ID: <674F70E5F2BE564CB06B6901FD3DD78B12CD0A01@tgxml337.toshiba.local>
References: <341064315C6D0D498193B256F238CF9747C9C9@TK5EX14MBXW603.wingroup.windeploy.ntdev.microsoft.com> <5EF8B214-6563-47C7-9D48-621D9D5E1B29@yegin.org> <tslip4r42r3.fsf@mit.edu>
In-Reply-To: <tslip4r42r3.fsf@mit.edu>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
x-originating-ip: [133.199.16.82]
msscp.transfermailtomossagent: 103
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Mar 2013 19:52:42 -0000

Sam, 

It is quite obvious from the definition EAP re-authentication in RFC 5247:

"
   EAP Re-Authentication
      EAP authentication between an EAP peer and a server with whom the
      EAP peer shares valid unexpired EAP keying material.
                            ^^^^^^^^^
"

On the other hand, mandating reauth may be a bit strong requirement since neither the client nor the server may want  to continue to talk after the lifetime of the SA.

Having said that, I prefer a revised version of option 1) as follows:

If reauth happens, it MUST happen before SA expires.

Regards,
Yoshihiro Ohba


-----Original Message-----
From: pcp-bounces@ietf.org [mailto:pcp-bounces@ietf.org] On Behalf Of Sam Hartman
Sent: Sunday, March 17, 2013 3:30 AM
To: Alper Yegin
Cc: pcp@ietf.org
Subject: Re: [pcp] Posted auth req slide that was edited during meeting

>>>>> "Alper" == Alper Yegin <alper.yegin@yegin.org> writes:

    Alper> Yeah, let me do that.

    Alper> Option 4 is based on using "expired" security associations as
    Alper> if they did not expire.

    Alper> This is obviously a bad idea. 

Alper, it's not obvious to me why using a security association for status updates regarding an existing mapping is bad after it's expired for new mappings.

I agree that we'll need to analyze the security of whatever we do and document any attacks that result.

Would you care to explain why you think people set up security association expiration so we can evaluate whether this particular use opens up any attacks with regard to the design goals of security association expiration?
_______________________________________________
pcp mailing list
pcp@ietf.org
https://www.ietf.org/mailman/listinfo/pcp