Re: [ppsp] questions about merkle hash tree mechanism for integrity protection of content between peers

Arno Bakker <arno@cs.vu.nl> Tue, 06 November 2012 07:17 UTC

Return-Path: <a.bakker@vu.nl>
X-Original-To: ppsp@ietfa.amsl.com
Delivered-To: ppsp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B04021F8687 for <ppsp@ietfa.amsl.com>; Mon, 5 Nov 2012 23:17:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.604
X-Spam-Level:
X-Spam-Status: No, score=-1.604 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zdd6BQ3muXk3 for <ppsp@ietfa.amsl.com>; Mon, 5 Nov 2012 23:17:34 -0800 (PST)
Received: from mailin.vu.nl (mailin.vu.nl [130.37.164.17]) by ietfa.amsl.com (Postfix) with ESMTP id 59EB621F8685 for <ppsp@ietf.org>; Mon, 5 Nov 2012 23:17:33 -0800 (PST)
Received: from PEXHB011B.vu.local (130.37.236.65) by mailin.vu.nl (130.37.164.17) with Microsoft SMTP Server (TLS) id 14.2.298.4; Tue, 6 Nov 2012 08:17:31 +0100
Received: from [109.37.48.207] (130.37.238.20) by mails.vu.nl (130.37.236.65) with Microsoft SMTP Server (TLS) id 14.2.298.4; Tue, 6 Nov 2012 08:17:31 +0100
Message-ID: <5098B998.5080704@cs.vu.nl>
Date: Tue, 06 Nov 2012 08:17:44 +0100
From: Arno Bakker <arno@cs.vu.nl>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: 邓灵莉/Lingli Deng <denglingli@chinamobile.com>
References: <005f01cdbb7c$bcfe8cb0$36fba610$@com>
In-Reply-To: <005f01cdbb7c$bcfe8cb0$36fba610$@com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [130.37.238.20]
Cc: 'ppsp' <ppsp@ietf.org>
Subject: Re: [ppsp] questions about merkle hash tree mechanism for integrity protection of content between peers
X-BeenThere: ppsp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: arno@cs.vu.nl
List-Id: discussing to draw up peer to peer streaming protocol <ppsp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ppsp>, <mailto:ppsp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ppsp>
List-Post: <mailto:ppsp@ietf.org>
List-Help: <mailto:ppsp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ppsp>, <mailto:ppsp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Nov 2012 07:17:35 -0000

On 05/11/2012 18:41, 邓灵莉/Lingli Deng wrote:
> Hi Arno,
>
> Thank you for the impressive speech and demos this morning.
>

Hi

thanks, but that was my boss, Johan. I was virtually present in the meeting.

> I have a few questions about the security proposals in current peer
> protocol draft:
>
> 1)Swarm ID, be it the roothash of a merkle-tree in video-on-demand cases
> or a public key of the initiator in live cases, is not straightforwardly
> inferred to a joining peer, which means there has to be some way to
> securely and uniquely derived from the common knowledge of a joining
> peer (for instance, a few vague key words to search what the user
> wants). I understand that, the pollution issue concerns not only serving
> as you asked, but also serving as you expected. What do you do in your
> implementation? Or the user just know what to check in the first place?
>

I'm not sure I get what you mean. The swarm ID is the identifier of the 
swarm, so if a peer wants to join a swarm it must know the swarm ID. As 
the PPSPP swarm IDs are self-certifying, a peer is always guaranteed to 
get what he asked for. The assumption is that the peer gets the swarm ID 
from a trusted source, e.g. a webportal that says "This BBC Top Gear 
episode that you want to watch has roothash X".


> 2)For ECS proposal, I doubt the one-to-one encryption negotiation is
> scalable for a peer serving more than one peers at a time. Since you are
> not targeting DRM requirements, revocable group keys may suite your
> needs, while the data can be encrypted once and for all given the group
> membership remains unchanged.
>

Dusan?

CU,
     Arno