Re: [pcp] #62: Client-driven or server-driven auth retransmissions
Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp> Wed, 24 October 2012 12:45 UTC
Return-Path: <yoshihiro.ohba@toshiba.co.jp>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29FA221F868C for <pcp@ietfa.amsl.com>; Wed, 24 Oct 2012 05:45:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.927
X-Spam-Level:
X-Spam-Status: No, score=-4.927 tagged_above=-999 required=5 tests=[AWL=-0.838, BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_MED=-4, UNPARSEABLE_RELAY=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yQ-hM4AFgX4Q for <pcp@ietfa.amsl.com>; Wed, 24 Oct 2012 05:45:09 -0700 (PDT)
Received: from imx2.toshiba.co.jp (inet-tsb5.toshiba.co.jp [202.33.96.24]) by ietfa.amsl.com (Postfix) with ESMTP id 523E621F86BC for <pcp@ietf.org>; Wed, 24 Oct 2012 05:45:09 -0700 (PDT)
Received: from arc1.toshiba.co.jp ([133.199.194.235]) by imx2.toshiba.co.jp with ESMTP id q9OCj8w9023822 for <pcp@ietf.org>; Wed, 24 Oct 2012 21:45:08 +0900 (JST)
Received: (from root@localhost) by arc1.toshiba.co.jp id q9OCj8P4000466 for pcp@ietf.org; Wed, 24 Oct 2012 21:45:08 +0900 (JST)
Received: from unknown [133.199.192.144] by arc1.toshiba.co.jp with ESMTP id XAA00465; Wed, 24 Oct 2012 21:45:07 +0900
Received: from mx.toshiba.co.jp (localhost [127.0.0.1]) by ovp2.toshiba.co.jp with ESMTP id q9OCj7Ji016574 for <pcp@ietf.org>; Wed, 24 Oct 2012 21:45:07 +0900 (JST)
Received: from tsbpoa.po.toshiba.co.jp by toshiba.co.jp id q9OCj7Nu021151; Wed, 24 Oct 2012 21:45:07 +0900 (JST)
Received: from [133.199.16.209] by mail.po.toshiba.co.jp (Sun Java System Messaging Server 6.1 HotFix 0.05 (built Oct 21 2004)) with ESMTPSA id <0MCE005V1E33G320@mail.po.toshiba.co.jp> for pcp@ietf.org; Wed, 24 Oct 2012 21:45:07 +0900 (JST)
Date: Wed, 24 Oct 2012 21:45:02 +0900
From: Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp>
In-reply-to: <tslwqyggjxb.fsf@mit.edu>
To: pcp@ietf.org
Message-id: <5087E2CE.4090201@toshiba.co.jp>
MIME-version: 1.0
Content-type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-transfer-encoding: 7bit
References: <059.9cf5d7c12f5da883f5db53fb2786e69b@tools.ietf.org> <tslwqyggjxb.fsf@mit.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120907 Thunderbird/15.0.1
Subject: Re: [pcp] #62: Client-driven or server-driven auth retransmissions
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Oct 2012 12:45:10 -0000
Sam, Your description below did not capture DoS attack issue with client-driven retransmission that I mentioned. It would be fair if you could mention it. Yoshihiro Ohba (2012/10/24 20:59), Sam Hartman wrote: > Hi. > Yoshi and I have had several rounds of discussing EAp retransmissions in > the ABFAB working group. > My understanding of the situation has improved. > > Retransmission of an EAP request will always happen I've been describing > this issue incorrectly when I brought it up in the PCP group. > > The question is what is used to trigger retransmissions, not what party > does the retransmission. > > The authenticator (PCP server/PAA) has the EAP request packet as part of > security state it maintains. > > The question is whether the authenticator has a timer that causes it to > retransmit the request. That's what the default behavior in EAP is. > > Alternatively, the EAP specification (RFC 3748) allows that timer to be > set to infinite. In that case, the lower layer (PCP or PANA) is taking > responsibility for reliability. > > If the lower layer is handling reliability, then you can use whatever > trigger you like. > You can have a timer on the server. > Alternatively, you can have a timer on the client and retransmit the > request on the server when you receive a duplicate response. > > So, no matter what option you pick, the server is required to hold the > state. > The potential advantage of picking client-triggered retransmits is that > it may make it easier to match an existing implementation. > > We could really use input from PCP implementations about whether having > the authentication retransmit timer on the client is easier than the > server. > _______________________________________________ > pcp mailing list > pcp@ietf.org > https://www.ietf.org/mailman/listinfo/pcp >
- [pcp] #62: Client-driven or server-driven auth re… pcp issue tracker
- Re: [pcp] #62: Client-driven or server-driven aut… Sam Hartman
- Re: [pcp] #62: Client-driven or server-driven aut… Yoshihiro Ohba
- Re: [pcp] #62: Client-driven or server-driven aut… Sam Hartman
- Re: [pcp] #62: Client-driven or server-driven aut… Simon Perreault
- Re: [pcp] #62: Client-driven or server-driven aut… Rafa Marin Lopez
- Re: [pcp] #62: Client-driven or server-driven aut… Alper Yegin
- Re: [pcp] #62: Client-driven or server-driven aut… Alper Yegin
- Re: [pcp] #62 (authentication): Client-driven or … pcp issue tracker