Re: [pcp] Comparison of PCP authentication

"Dan Wing" <dwing@cisco.com> Mon, 06 August 2012 18:01 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D63821F85C9 for <pcp@ietfa.amsl.com>; Mon, 6 Aug 2012 11:01:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.489
X-Spam-Level:
X-Spam-Status: No, score=-110.489 tagged_above=-999 required=5 tests=[AWL=0.110, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ACxd6O2rTW7B for <pcp@ietfa.amsl.com>; Mon, 6 Aug 2012 11:01:18 -0700 (PDT)
Received: from mtv-iport-1.cisco.com (mtv-iport-1.cisco.com [173.36.130.12]) by ietfa.amsl.com (Postfix) with ESMTP id 89A6121E805E for <pcp@ietf.org>; Mon, 6 Aug 2012 11:01:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=dwing@cisco.com; l=3490; q=dns/txt; s=iport; t=1344276078; x=1345485678; h=from:to:references:in-reply-to:subject:date:message-id: mime-version:content-transfer-encoding; bh=oD8gG37ihfXcslafUSjMl+tsoLczOa0RT1UgJYnzcUg=; b=D+K1Z6Q44rF+cc9lFB7dzm+RzGPnrPVBxA1mHhKOyIP70F1ZJ7F+ueoj /RcfZ7EsbYKjiZA9MBf4zCW+bJ28TF9qwme+UmFWuahKfkg69T7SH2QnL p/9JobV7LPOFXRR9YWa4zq8/kliXARp1IXkd2pD254BK/MwSoD2oosxwZ 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgAFAH8FIFCrRDoG/2dsb2JhbABFqhGPNoEHgiABAQECAQEICgEXEEsBAwIJDwIEAQEoBxkjCgkIAQEEARIJAheHZQUMmnKNY5I4i0qHBAOITYUNiQONEoFmgn8
X-IronPort-AV: E=Sophos;i="4.77,720,1336348800"; d="scan'208";a="51131292"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-1.cisco.com with ESMTP; 06 Aug 2012 18:01:11 +0000
Received: from dwingWS (sjc-vpn6-84.cisco.com [10.21.120.84]) by mtv-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id q76I1BAB016868; Mon, 6 Aug 2012 18:01:11 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Alper Yegin' <alper.yegin@yegin.org>, pcp@ietf.org
References: <9B57C850BB53634CACEC56EF4853FF653B6EC381@TK5EX14MBXW604.wingroup.windeploy.ntdev.microsoft.com> <7FE144CF-00E3-4451-8CBE-A6A684DB7CC4@yegin.org>
In-Reply-To: <7FE144CF-00E3-4451-8CBE-A6A684DB7CC4@yegin.org>
Date: Mon, 06 Aug 2012 11:01:11 -0700
Message-ID: <067d01cd73fd$765a6c50$630f44f0$@com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Ac1w9ilAavIR1gn8SpS9wUE6Ojd5XQDBpoQg
Content-Language: en-us
Subject: Re: [pcp] Comparison of PCP authentication
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Aug 2012 18:01:22 -0000

> -----Original Message-----
> From: pcp-bounces@ietf.org [mailto:pcp-bounces@ietf.org] On Behalf Of
> Alper Yegin
> Sent: Thursday, August 02, 2012 2:31 PM
> To: pcp@ietf.org
> Subject: [pcp] Comparison of PCP authentication
> 
> http://www.ietf.org/proceedings/84/slides/slides-84-pcp-10.pdf
> 
> Ah, isn't it odd that this beauty contest is run by one of the
> contestants? This material should have been prepared and presented by a
> neutral party.
> 
> One important question: With this proposal, are the authors advocating
> each protocol should come with their own in-band key management, more
> specifically embedding an EAP transport?
> 
> 
> > what's the big deal of using the same port vs different port? Is
> jamming all in the same port is a benefit?
> 
> > "TLS is in-band"
> 
> - There's standalone use of TLS as "a separate" KMP. RFC 5705 is driven
> by the fact that some other protocols need to use TLS as a "separate
> KMP".
> - TLS is basically "transport layer security", something that sits
> below the protocol one would be trying to secure. We are not doing
> that.

To throw another TLS thing into the mix:

DTLS-SRTP [RFC5764] uses the (D)TLS handshake to encrypt SRTP and is
pretty well aligned with what we want for PCP -- we want a key
exchange and then run the PCP protocol natively.  DTLS-SRTP has a 
normal DTLS handshake, followed by SRTP packets that appear normal 
on the wire (that is, the packets are RFC3711 packets which have
their RTP headers in the clear).  It does this over the same socket,
because the first byte indicates if the packet is DTLS, SRTP, or
STUN (ICE), http://tools.ietf.org/html/rfc5764#section-5.1.2.

At the meeting, I suggested we consider if PANA and PCP could
be similarly demux'd.  Stuart suggested using some sort of GRE-
like header if they cannot be demux'd.  Either approach would 
eliminate one of the objections of PANA, specifically its use 
of a separate port.

-d



> > are the EAP and PCP state machines compatible? If marrying two
> protocols, one needs to pay attention to this. This was one of the
> reasons why EAPoDHCP did not work.
> 
> > Does the EAP-over-PCP satisfy the "EAP lower layer requirements" as
> stated in RFC 3848? I had asked this question but don't remember seeing
> any response.
> 
> > "Possible in-band optimization". Is this documented anywhere? It's
> not easy to understand how it works by looking at this slide.
> 
> > PANA RFC 5191 was published in 2008, not 2011. It's adopted by Zigbee
> IP, ETSI TISPAN, and also ETSI M2M. Aside from two open-source
> implementations, multiple commercial implementations have successfully
> passed interop events in Zigbee Alliance.
> 
> >
> 
> *	Need to specify the portions of PANA that don't need to be
> implemented
> 
> 	in a PCP PANA Client and Server (such as IP Address
> reconfiguration)
> 
> 
> 	>> this is just a single bit flag. We don't use it, and that's
> all we need to do about it.
> *	Need to specify/describe interface between PANA and PCP elements
> 
> 	>> this is an implementation issue, like how the other spec
> implementors would need to define the interface between the EAP and PCP
> for passing keys, etc.
> 
> *	Need to specify how the PANA client finds the correct PANA Server
> for PCP Authentication (may be passed from PCP client?)
> 
> 	>> PCP server the the PAA are the same node.
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
>