Re: [sfc] proof-of-transit: continue with both approaches, or choose one?

"Joel M. Halpern" <jmh@joelhalpern.com> Sun, 16 December 2018 20:52 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D32A9130DC1 for <sfc@ietfa.amsl.com>; Sun, 16 Dec 2018 12:52:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m8s2lDbnPrCR for <sfc@ietfa.amsl.com>; Sun, 16 Dec 2018 12:52:43 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5958126C01 for <sfc@ietf.org>; Sun, 16 Dec 2018 12:52:42 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 43HxLf4hLwz1tpw6; Sun, 16 Dec 2018 12:52:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1544993562; bh=Fsv0e0mWsBZYQQK00IVxZgSZzAldR2YVQlafQD3neJw=; h=Subject:To:References:From:Date:In-Reply-To:From; b=V1EPhqN1CtbrP1nl8MzMZv8/31cMd1W2LwR+31dktDLtH2P+r6/D2z9+j/ebVcZl/ lUG0Z2Ow5z4mW6ZvcpBnyyQ1z0GKpnoec4eUPO6mk5PTZ/WWZzmLw9OoQ4bGOsx5a3 NCz6/bIjxoBsy7jcM/WBD5vomOa/CZIGbogGQmA8=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 43HxLf0hSYzLW4P; Sun, 16 Dec 2018 12:52:41 -0800 (PST)
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, "sfc@ietf.org" <sfc@ietf.org>
References: <210af706ed8d4b73aa8c77a24777d622@XCH-RCD-008.cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <ef644b4b-afae-c5ea-da33-20ed63365988@joelhalpern.com>
Date: Sun, 16 Dec 2018 15:52:41 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <210af706ed8d4b73aa8c77a24777d622@XCH-RCD-008.cisco.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/3NO6lQ6Tja4iB8Osk9EH4nYsFUc>
Subject: Re: [sfc] proof-of-transit: continue with both approaches, or choose one?
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Dec 2018 20:52:45 -0000

<no hats>
Personally, the argument for just using SSSS, given that it now can 
provide ordered verification, seems quite persuasive to me.
Yours,
Joel
<hat floating back on slowly>

On 12/15/18 3:19 PM, Frank Brockners (fbrockne) wrote:
> During the SFC WG at IETF 103 in Bangkok we raised the question, whether 
> we could simplify the draft and choose a single algorithm for 
> proof-of-transit only (see also 
> https://datatracker.ietf.org/meeting/103/materials/minutes-103-sfc-01). 
> Given that we could not come to a conclusion, we decided to take the 
> discussion to the list.
> 
> Background:
> 
> draft-ietf-sfc-proof-of-transit-01 describes two different approaches: 
> “nested encryption” and “Shamir’s secret sharing scheme (SSSS)”. We 
> documented both approaches in the initial version of the draft, because 
> the two approaches had different qualities: While SSSS was 
> computationally cheaper (each node only needs to perform two additions, 
> a multiplication and a modulo-division), nested-encryption allowed to 
> verify that packets traversed a set of nodes in a particular order 
> (“ordered POT - OPOT”) – something that the SSSS-approach in the initial 
> version of the draft did not offer. With the changes discussed in IETF 
> 102 and now documented in draft-ietf-sfc-proof-of-transit-01, both 
> approaches offer order preservation.
> 
> In summary, we can now observe the following qualities of the two 
> approaches:
> 
>   * SSSS: Allows verification that a given set of nodes has been
>     traversed in a specific order (POT and OPOT). SSSS without order
>     preservation requires 2 additions, 1 multiplication, 1 division per
>     node participating in POT. Order preservation on top of that
>     requires an additional XOR (or similar).
>   * Nested-encryption: Allows verification that a given set of nodes has
>     been traversed in a specific order (POT and OPOT). The computational
>     effort of nested encryption depends on the crypto algorithm chosen
>     and typically higher than SSSS, i.e.. it requires/benefits from
>     hardware with specific capabilities (e.g. AES-NI). 
> 
> Question:
> 
> Given that both approaches both solve the problem of POT and ordered 
> POT, should we consider simplifying the draft and describe only a single 
> approach? If so, which approach should we choose?
> 
> I.e. when taking the computational effort into account and the fact that 
> options increase the burden for any implementor, we could decide to only 
> describe the SSSS approach in the draft.
> 
> Thoughts? Opinions?
> 
> Many thanks, Frank
> 
> 
> 
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>