Re: [Sip] comments on draft-kupwade-sip-iba-00

Eric Rescorla <ekr@networkresonance.com> Wed, 27 February 2008 05:39 UTC

Return-Path: <sip-bounces@ietf.org>
X-Original-To: ietfarch-sip-archive@core3.amsl.com
Delivered-To: ietfarch-sip-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C050C28C333; Tue, 26 Feb 2008 21:39:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.302
X-Spam-Level:
X-Spam-Status: No, score=-0.302 tagged_above=-999 required=5 tests=[AWL=0.135, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HrmH98-TSUPP; Tue, 26 Feb 2008 21:39:28 -0800 (PST)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 190E53A68F4; Tue, 26 Feb 2008 21:39:28 -0800 (PST)
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ECEF13A68F4 for <sip@core3.amsl.com>; Tue, 26 Feb 2008 21:39:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O8-wis4-wdGF for <sip@core3.amsl.com>; Tue, 26 Feb 2008 21:39:21 -0800 (PST)
Received: from romeo.rtfm.com (unknown [74.95.2.173]) by core3.amsl.com (Postfix) with ESMTP id 5A6A93A686E for <sip@ietf.org>; Tue, 26 Feb 2008 21:39:21 -0800 (PST)
Received: from romeo.rtfm.com (localhost.rtfm.com [127.0.0.1]) by romeo.rtfm.com (Postfix) with ESMTP id 8A9DE5081A; Tue, 26 Feb 2008 21:41:05 -0800 (PST)
Date: Tue, 26 Feb 2008 21:41:05 -0800
From: Eric Rescorla <ekr@networkresonance.com>
To: Jonathan Rosenberg <jdrosen@cisco.com>
In-Reply-To: <47C4C85F.4050000@cisco.com>
References: <47C4C85F.4050000@cisco.com>
User-Agent: Wanderlust/2.14.0 (Africa) Emacs/21.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Message-Id: <20080227054105.8A9DE5081A@romeo.rtfm.com>
Cc: IETF SIP List <sip@ietf.org>
Subject: Re: [Sip] comments on draft-kupwade-sip-iba-00
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: sip-bounces@ietf.org
Errors-To: sip-bounces@ietf.org

At Tue, 26 Feb 2008 21:18:07 -0500,
Jonathan Rosenberg wrote:
> 
> Harsh, Dean,
> 
> Thanks much for this document. Its great to see folks trying to tackle 
> new areas of work, especially tough ones like identity.
> 
> The concept of identity based security is a new one to me; how mature is 
> this stuff?

Well, my pairing based cryptography expert friends tell me
that the algorithms in this draft are pretty far off the current
state of the art, which would be something from the Boneh-Boyen
family. BB is pretty well regarded.


> Are there any commercial uses yet? 

Yes:
www.voltage.com
www.identum.com

(full disclosure: I'm on Voltage's TAB).


> What about intellectual 
> property issues?

Yes, there are a number of patents in the field. I don't know about
these specific algorithms, but given that they post-date the
original Boneh-Franklin IBE patent, it wouldn't be surprising
if they were covered by patents. Dean?



> Has it been well-studied by experts to assess its 
> robustness? i.e., have folks been trying to crack it, and so far its 
> held up?

Yes, at least for the Boneh-Franklin and Boneh-Boyen stuff.
As with all modern algorithms, there are security reductions
to some assumed hard problem. HArd to know how much that
should comfort you.

> 
> I agree with Ekr that the primary advantage from a pure signature 
> perspective is the ability to eliminate the fetching of the certificate. 
> I think this is more beneficial than just 'compression'. Identity-Info 
> presents the certificate by reference. The increasing numbers of NAT and 
> firewalls and SBCs are making me increasingly worried that the ability 
> to reach across the network, back to the originator, and fetch ANYTHING 
> over http, will be really hard in SIP deployments. So there is value in 
> eliminating this IMHO.

Sure, but we could just shove the certificate into the message
in a new header or in the body, at which point we are talking
about compression. Moreover, there's no requirement that the
certificate be on the UAC's machine. If people care about this,
then it seems pretty likely that the CA can operate a site
which hosts your certificate for you. This is especially true
when we're talking about one certificate per domain as assumed
by RFC 4474.


> I must say I didn't understand how revocation works. From the 
> description of the algorithm it seemed untenable. The verifier never 
> needs to obtain a cert and the public key is generated statically from 
> the identity. Once they have the private key, the sender can always sign 
> with it, so I don't see how revocation is possible.

The way this is done is with what's effectively short-lived
identities (you could do the same thing with short-lived
certificates) you treat the time as part of the identity.
E.g., you might be "jdrosen@cisco.com:March-April, 2008". So,
the user needs to periodically refresh his private key to match
the new identity. If the key has been revoked you don't issue
new keys.

-Ekr


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sipping@ietf.org for new developments on the application of sip