Re: [sidr] Keys and algorithms for Updates - feasibility analysis? (was Re: RPKI and private keys)
Brian Dickson <brian.peter.dickson@gmail.com> Mon, 07 May 2012 20:56 UTC
Return-Path: <brian.peter.dickson@gmail.com>
X-Original-To: sidr@ietfa.amsl.com
Delivered-To: sidr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5A2821F8470 for <sidr@ietfa.amsl.com>; Mon, 7 May 2012 13:56:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.298
X-Spam-Level:
X-Spam-Status: No, score=-3.298 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rSIjvn-osjcD for <sidr@ietfa.amsl.com>; Mon, 7 May 2012 13:56:32 -0700 (PDT)
Received: from mail-we0-f172.google.com (mail-we0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id AE10021F8464 for <sidr@ietf.org>; Mon, 7 May 2012 13:56:31 -0700 (PDT)
Received: by werf13 with SMTP id f13so2868615wer.31 for <sidr@ietf.org>; Mon, 07 May 2012 13:56:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=uOaqqHapWOPFFPttnKpV4NKgN3U9q4Gjnt2WN8mMMjM=; b=jykhQFG8Ru5PsW//7gZEL2mEnogIRR9q/+xQ/ZLB3Lfxl/nKHXmGqqUWM9+NL+sfJj d6Tr2gL3d+3uaoAMkAT3MhqfacPmu3ZYmhfO+vdJgYCzPEEZeWnCDDYbrmKNTLPtDd9I aKyC/1pxxBiJL+rRbQPQJNh2gisRC0ZbaxSczcIsIqTXRIongPzazUBMsQhVjmRullWC kXt/NtjLbGxwMRfl93xULfR7gMPmKKN4f0GLU/kE8O6ucE3pBVCYosNNcvp1ZM3VkDor dsK6jAtG7Fl2itzp5i37NtT1GC9d41qaCsnXWcHi4VMHCKmKhJYAYDC8rjGjoHqf9San LhOw==
MIME-Version: 1.0
Received: by 10.180.100.230 with SMTP id fb6mr14111973wib.3.1336424190802; Mon, 07 May 2012 13:56:30 -0700 (PDT)
Received: by 10.223.93.138 with HTTP; Mon, 7 May 2012 13:56:30 -0700 (PDT)
In-Reply-To: <CAL9jLab2XT-4NWr8KyHKOiQMTWqE5cTavmEr4Uw+S4zhrA=YLA@mail.gmail.com>
References: <CAH1iCiruThFzpef5u9NVt+3AokGnuFhq-GrbqEOkkKnVhav4zQ@mail.gmail.com> <CAL9jLab2XT-4NWr8KyHKOiQMTWqE5cTavmEr4Uw+S4zhrA=YLA@mail.gmail.com>
Date: Mon, 07 May 2012 16:56:30 -0400
Message-ID: <CAH1iCiq3so54pE9XBM5Bp13xaERbmShipmCg=ckEySiDsh5ZPQ@mail.gmail.com>
From: Brian Dickson <brian.peter.dickson@gmail.com>
To: Christopher Morrow <morrowc.lists@gmail.com>
Content-Type: multipart/alternative; boundary="f46d041824ee297ca204bf788157"
Cc: sidr wg list <sidr@ietf.org>
Subject: Re: [sidr] Keys and algorithms for Updates - feasibility analysis? (was Re: RPKI and private keys)
X-BeenThere: sidr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Interdomain Routing <sidr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidr>, <mailto:sidr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sidr>
List-Post: <mailto:sidr@ietf.org>
List-Help: <mailto:sidr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidr>, <mailto:sidr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 May 2012 20:56:33 -0000
The particulars are a bit vague at the moment, beyond a back-of-the-envelope design. For OOB validation, you need the following kinds of things: - a validator box - an auth-data source of truth - some way of knowing that the source of truth is legitimate - a way for the signing router to establish sync with the source of truth The auth-data source-of-truth could have credentials in RPKI. (Actually, this would probably be mandatory.) The router and source-of-truth would need to have some scheme for seeding PNRGs identically, e.g. using DH shared secret(s). The source-of-truth would probably need a running feed of discarded nonces (to avoid memory exhaustion), possibly via ordinals (N for Nth PNRG value, rather than the value itself), possibly using RLE (run-length encoding). The validator would need to talk to the source-of-truth, using a query/answer type protocol, preferably with cacheable answers, preferably over some secured channel (e.g. using DH shared secret). So the process for validating 3 as-hops away would be something like: - receive the nonced-update - send the relevant bits to the OOB validator (locally operated cacheing validator "box") - wait for an appropriate answer from the OOB validator, mark according to the answer received - OOB validator can be treated as a modest-latency, high-bandwidth black-box,maybe with some occasional jitter. The validator would handle a feed per peering session, per router; how it scales is a question of implementation, optimization, load issues, etc. Cacheable answers yield benefits immediately, in terms of scaling behavior. The validator would probably want to handle several aspects of its job in a smart manner - sensible behavior regarding latency to individual source-of-truth hosts - sensible behavior in the face of network issues - local optimizations intra-AS and even inter-AS for additional caching - pre-loaded data for validation of cached data (e.g. KSK DNSKEYs for zones if the validation uses DNSSEC, as an example.) - sufficient number of answer "states" which can be interpreted in a suitable fashion, like FAILED_VALIDATION, NO_ANSWER_YET, NO_ANSWER, NOT_FOUND, ORIGIN_VALIDATION_FAILED, or VALID - sane design regarding FIFO nature of BGP (mandatory) and head-of-line blocking (bad juju) Fundamentally, though, modulo caching logic, the validator would directly query the source-of-truth for the ASN which is 3 as-hops away. Brian On Mon, May 7, 2012 at 4:29 PM, Christopher Morrow <morrowc.lists@gmail.com>wrote: > I'm probably confused, or the example has been simplified.. but > > On Mon, May 7, 2012 at 2:58 PM, Brian Dickson > <brian.peter.dickson@gmail.com> wrote: > > Scenario 2: > > perform basic pseudo-signature once, repeat for routing table of 400,000 > in > > size. > > pseudo-signature operation: > > use N distinct pseudo-random number generators (PNRG), seeded > > separately with state preservation (N=8 corresponds to 256 bits of > entropy) > > call random() from each preserved state to generate a 32-bit random > > number, concatenate the N x 32 bit values > > how do I check 3 as-hops away that whatever is attached to the update > means that the update was signed? you seem to be saying: "sign with > some random bytes that you make up on the fly". > > -chris >
- [sidr] Keys and algorithms for Updates - feasibil… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Sriram, Kotikalapudi
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Ross.Anderson@cl.cam.ac.uk
- Re: [sidr] Keys and algorithms for Updates - feas… Sriram, Kotikalapudi
- Re: [sidr] Keys and algorithms for Updates - feas… Murphy, Sandra
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Murphy, Sandra
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Brian Dickson
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Ross.Anderson@cl.cam.ac.uk
- Re: [sidr] Keys and algorithms for Updates - feas… Christopher Morrow
- Re: [sidr] Keys and algorithms for Updates - feas… Montgomery, Douglas
- Re: [sidr] sidrKeys and algorithms for Updates - … Wes Hardaker