Re: [perpass] tcpcrypt applicability (Was: Re: Violating end-to-end principle: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt)

Phillip Hallam-Baker <hallam@gmail.com> Wed, 22 January 2014 00:35 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DDB641A0125 for <perpass@ietfa.amsl.com>; Tue, 21 Jan 2014 16:35:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VgJDVnEbz3HO for <perpass@ietfa.amsl.com>; Tue, 21 Jan 2014 16:35:41 -0800 (PST)
Received: from mail-la0-x22e.google.com (mail-la0-x22e.google.com [IPv6:2a00:1450:4010:c03::22e]) by ietfa.amsl.com (Postfix) with ESMTP id EC24D1A01BC for <perpass@ietf.org>; Tue, 21 Jan 2014 16:35:40 -0800 (PST)
Received: by mail-la0-f46.google.com with SMTP id b8so7210838lan.33 for <perpass@ietf.org>; Tue, 21 Jan 2014 16:35:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=07oNTuGFlLk0tHu6T9Yq8crQmPAgjsVCv3hSxmc+jRs=; b=iwW32wKI0j1tSj/QksXIhTkXoIF3R+cDGreT6HIO88ovhUGqJzFtHugslJqrpe07xU tzKzlSTUkBs+hFUIGszyYBwxJem79WYqDQKyCkrCbjJ0uIx7Oh7ntW2upqM11UPtIVMS lxrN5YJNel2mqVn25/6kLgrJgKirVeygej0oKxY8Iox/sKH7Ku0vUdd8m6AIZZ0AZzei WNurDgI2kBswI/tFJiZiekX2qamftTczerP4jVw/OHOkaGBvSaFLSvmGDlxjjLR3YwEu TIqMXoLPGAJ7/YKqUXJLDR6N5IfeN/4h3T3wula7rktZMiIXfZCiGuXJ3NppDiEHUBKi Twcw==
MIME-Version: 1.0
X-Received: by 10.112.150.200 with SMTP id uk8mr16589105lbb.1.1390350939958; Tue, 21 Jan 2014 16:35:39 -0800 (PST)
Received: by 10.112.37.172 with HTTP; Tue, 21 Jan 2014 16:35:39 -0800 (PST)
In-Reply-To: <52DEA0BF.3020507@bbn.com>
References: <04c001cf1123$7e5c00c0$7b140240$@olddog.co.uk> <CAMm+Lwj0r3PNoBC0Y1ydibD3piioZ57Z1Ks-Ea6o58xahjXKwQ@mail.gmail.com> <20140116192320.GD32098@thunk.org> <52D84F68.7030100@cs.tcd.ie> <52DD3CAA.6010004@bbn.com> <52DD3E64.2000707@cs.tcd.ie> <52DD404B.1080705@bbiw.net> <CAMm+Lwh0Lm0NbTjAO0h4weUUQhi_oS230r6wxsE09Pc8enKoRw@mail.gmail.com> <52DE9174.7000504@bbn.com> <CAMm+Lwiy-TTt-tShH3KkJ_u+L8JXtOLpwx1zmtTy7Rq9G977PQ@mail.gmail.com> <52DEA0BF.3020507@bbn.com>
Date: Tue, 21 Jan 2014 19:35:39 -0500
Message-ID: <CAMm+LwiwssLsqkQH35LRsCP4Eo-7qB8y0t6W2T8XuMBx6mtUeA@mail.gmail.com>
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Stephen Kent <kent@bbn.com>
Content-Type: multipart/alternative; boundary="047d7b342f86e3b21d04f0844d93"
Cc: perpass <perpass@ietf.org>
Subject: Re: [perpass] tcpcrypt applicability (Was: Re: Violating end-to-end principle: I-D Action: draft-farrelll-mpls-opportunistic-encrypt-00.txt)
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jan 2014 00:35:44 -0000

Steve

If you are going to state that someone got their post wrong then all that
actually matters is what they said because that is the case you are arguing
against. You can't redefine my motion and then complain that I didn't
understand it.

If you are going to say I got things wrong and then followup with a
completely unrelated post then you are a confused bunny.

And I split the key agreement out of Omnibroker into WSConnect, oh, six
months ago. Precisely because it is a feature that we now need at the Web
Service layer. So hardly a 'hidden agenda'.

While we are at it we could reinstate photuris.




On Tue, Jan 21, 2014 at 11:30 AM, Stephen Kent <kent@bbn.com> wrote:

>  PHB,
>
> ...
>
>   Please do not confuse your misunderstanding of my post with my
> knowledge of the circumstances.
>
> read what I wrote, as opposed to your misunderstanding ...
>
>
>   IKE is certainly not currently packaged up for use an independent
> service. Saying that this could be done is not the same as it having been
> done.
>
>  The current IKE document begins as follows:
>
>  Kaufman, et al.              Standards Track                    [Page 4]
>
>   <http://tools.ietf.org/html/rfc5996#page-5>RFC 5996 <http://tools.ietf.org/html/rfc5996>                        IKEv2bis                  September 2010
>
> 1 <http://tools.ietf.org/html/rfc5996#section-1>.  Introduction
>
>    IP Security (IPsec) provides confidentiality, data integrity, access
>    control, and data source authentication to IP datagrams.
>
>   I said that IKE is *separate* from ESP and AH and that *AH and ESP can
> be used without IKE*.
>
> It is true that IKE is a version of ISAKMP that has been tailored to
> support IPsec, but it
> is still independent of ESP and AH; IKE uses its own mechanisms to protect
> its SAs, not ESP.
>
>  That is not how I expect a document describing an independent crypto
> protocol designed for use in other schemes to begin.
>
>  Suggesting that the IETF adopt a practice of requiring re-use of such
> schemes in the security area is actually suggesting quite a major change in
> our approach. i.e. instead of having PGP and S/MIME sit in separate rooms
> defining two different message formats for secure email, require them to
> agree on one message format that can be used with both trust
> infrastructures.
>
> (O)PGP and S/MIME are different in more ways than the assumed "trust
> infrastructure."
>
> I think no one is requiring re-use of IKE in contexts where it is not
> appropriate. However, given
> the complexity of developing good key management protocols, Security ADs
> usually advise against
> creating a new one unless it is necessary.
>
>   The idea that key exchange can be implemented as an independent Web
> Service is not something I expect to see in the IPSEC docs since the
> originals were written several years before the term was coined.
>
> Ah, so your (previously hidden) agenda is a push for a Web Service for key
> management. Well, at least that's
> on the table now, sitting next to OmniBroker.
>
> Steve
>



-- 
Website: http://hallambaker.com/