Re: [ppsp] tickets for IETF 83

Picconi Fabio <Fabio.Picconi@technicolor.com> Tue, 15 May 2012 12:47 UTC

Return-Path: <Fabio.Picconi@technicolor.com>
X-Original-To: ppsp@ietfa.amsl.com
Delivered-To: ppsp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8182B21F8546 for <ppsp@ietfa.amsl.com>; Tue, 15 May 2012 05:47:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.647
X-Spam-Level:
X-Spam-Status: No, score=-2.647 tagged_above=-999 required=5 tests=[AWL=3.951, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S1DbhFWh4ebC for <ppsp@ietfa.amsl.com>; Tue, 15 May 2012 05:47:35 -0700 (PDT)
Received: from na3sys009aog125.obsmtp.com (na3sys009aog125.obsmtp.com [74.125.149.153]) by ietfa.amsl.com (Postfix) with ESMTP id F084121F8549 for <ppsp@ietf.org>; Tue, 15 May 2012 05:47:29 -0700 (PDT)
Received: from MOPESEDGE01.eu.thmulti.com ([129.35.174.203]) (using TLSv1) by na3sys009aob125.postini.com ([74.125.148.12]) with SMTP ID DSNKT7JQYXjcNvy1lhZSbIfmn9YW1NpunMvQ@postini.com; Tue, 15 May 2012 05:47:33 PDT
Received: from MOPESMAILHC02.eu.thmulti.com (141.11.100.29) by mail3.technicolor.com (141.11.253.22) with Microsoft SMTP Server (TLS) id 8.3.192.1; Tue, 15 May 2012 14:45:39 +0200
Received: from MOPESMBX01.eu.thmulti.com ([169.254.1.225]) by MOPESMAILHC02.eu.thmulti.com ([141.11.100.29]) with mapi; Tue, 15 May 2012 14:45:42 +0200
From: Picconi Fabio <Fabio.Picconi@technicolor.com>
To: zhangyunfei <zhangyunfei@chinamobile.com>, "arno@cs.vu.nl" <arno@cs.vu.nl>, ppsp <ppsp@ietf.org>
Date: Tue, 15 May 2012 14:45:38 +0200
Thread-Topic: Re: [ppsp] tickets for IETF 83
Thread-Index: Ac0ySLvplJZFbNRaQDaXEPphLMXfdAAT40HQ
Message-ID: <320C4182454E96478DC039F2C481987204EB26E73A@MOPESMBX01.eu.thmulti.com>
References: <2012050316123830359558@chinamobile.com> <320C4182454E96478DC039F2C481987204EB1CD469@MOPESMBX01.eu.thmulti.com>, <4FB0FC97.7020601@cs.vu.nl> <2012051511133262864742@chinamobile.com>
In-Reply-To: <2012051511133262864742@chinamobile.com>
Accept-Language: fr-FR, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: fr-FR, en-US
Content-Type: multipart/alternative; boundary="_000_320C4182454E96478DC039F2C481987204EB26E73AMOPESMBX01eut_"
MIME-Version: 1.0
Subject: Re: [ppsp] tickets for IETF 83
X-BeenThere: ppsp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: discussing to draw up peer to peer streaming protocol <ppsp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ppsp>, <mailto:ppsp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ppsp>
List-Post: <mailto:ppsp@ietf.org>
List-Help: <mailto:ppsp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ppsp>, <mailto:ppsp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 May 2012 12:47:36 -0000

Indeed, I don’t think we should impose a security mechanism on the base protocol. There are existing systems that perform PEX without any security. Even the BitTorrent tracker allows you to spoof somebody and register them in the swarm.
There can be deployments where a secured PEX is not necessary (e.g., within a company).
In my view secure PEX can be left as an option.
Fabio

From: zhangyunfei [mailto:zhangyunfei@chinamobile.com]
Sent: mardi 15 mai 2012 05:14
To: arno@cs.vu.nl; ppsp; Picconi Fabio
Subject: Re: Re: [ppsp] tickets for IETF 83

Hi Arno,
   I guess Fabio's concern is mainly on the extra burden evaluation on the tracker by the security mechanism in PEX.

________________________________
zhangyunfei

From: Arno Bakker<mailto:arno@cs.vu.nl>
Date: 2012-05-14 20:37
To: ppsp@ietf.org<mailto:ppsp@ietf.org>
Subject: Re: [ppsp] tickets for IETF 83
Hi Fabio and all

On 14/05/2012 14:04, Picconi Fabio wrote:
>
> Ticket #3 (secure PEX): I think that we can stick to a simple PEX
> mechanism that can be augmented by an optional secure algorithm. In
> addition to the solution proposed by Arno, there is a simple mechanism
> described by Jesi et al. [1].
>

IMHO, leaving PEX unsecured will get us comments from the IESG. My
proposal is actually compatible with Jesi, Montresor, van Steen (Maarten
van Steen is my boss). My membership certificates correspond to their
signed node descriptors. This mechanism alone will prevent the addresses
of innocent hosts being spread. I add some extra security by exploiting
the central tracker. They go fully decentralized by probing the graph
for malicious structures.

CU,
     Arno
_______________________________________________
ppsp mailing list
ppsp@ietf.org<mailto:ppsp@ietf.org>
https://www.ietf.org/mailman/listinfo/ppsp