Re: [tcpm] TCP-AO: Text for New_Key Process

Brian Weis <bew@cisco.com> Fri, 30 January 2009 01:34 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2F2C228C185; Thu, 29 Jan 2009 17:34:32 -0800 (PST)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A52153A6ACD for <tcpm@core3.amsl.com>; Thu, 29 Jan 2009 17:34:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.487
X-Spam-Level:
X-Spam-Status: No, score=-6.487 tagged_above=-999 required=5 tests=[AWL=0.112, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ork8G2s0ipF0 for <tcpm@core3.amsl.com>; Thu, 29 Jan 2009 17:34:30 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id 7D8083A68DC for <tcpm@ietf.org>; Thu, 29 Jan 2009 17:34:30 -0800 (PST)
X-IronPort-AV: E=Sophos;i="4.37,347,1231113600"; d="scan'208";a="239473770"
Received: from sj-dkim-1.cisco.com ([171.71.179.21]) by sj-iport-6.cisco.com with ESMTP; 30 Jan 2009 01:34:12 +0000
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238]) by sj-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id n0U1YC7e017696; Thu, 29 Jan 2009 17:34:12 -0800
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-5.cisco.com (8.13.8/8.13.8) with ESMTP id n0U1YCiQ011967; Fri, 30 Jan 2009 01:34:12 GMT
Received: from xfe-sjc-211.amer.cisco.com ([171.70.151.174]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Thu, 29 Jan 2009 17:34:12 -0800
Received: from [128.107.163.184] ([128.107.163.184]) by xfe-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Thu, 29 Jan 2009 17:34:11 -0800
In-Reply-To: <498248B5.1080003@isi.edu>
References: <7.1.0.9.2.20081219010400.02bfd3d8@gmail.com> <496d9941.18038e0a.5558.ffffd3a6@mx.google.com> <497F7DDC.70309@isi.edu> <20090128162756.3799450822@romeo.rtfm.com> <B33C7F84-66B7-4F2C-9B04-2BC1716C7994@cisco.com> <498248B5.1080003@isi.edu>
Mime-Version: 1.0 (Apple Message framework v753.1)
Message-Id: <EF16EC2D-4366-44BF-85A9-335960C4405D@cisco.com>
From: Brian Weis <bew@cisco.com>
Date: Thu, 29 Jan 2009 17:35:31 -0800
To: Joe Touch <touch@ISI.EDU>
X-Mailer: Apple Mail (2.753.1)
X-OriginalArrivalTime: 30 Jan 2009 01:34:11.0944 (UTC) FILETIME=[DA743680:01C9827A]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=4008; t=1233279252; x=1234143252; c=relaxed/simple; s=sjdkim1004; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=bew@cisco.com; z=From:=20Brian=20Weis=20<bew@cisco.com> |Subject:=20Re=3A=20TCP-AO=3A=20Text=20for=20New_Key=20Proc ess |Sender:=20; bh=nee1SUiacjbscpFFLJmofAtkPkmzcmXwy+S35JMkhl4=; b=uO9VD8x9MeLlMfRXYtrTK10Lgd8Y5+mL7Lb3yLhYLoTEnaTxjMmpW8DHiu bGMHKWWij4Vg/0Vot3us/W4erVacb+LkcEHClsi8+4Oldl+CbqrpiHdkxuM2 nQUHvLSbAOAuQMn0py9Y8u7aRVeBSqnAqfop+pfy7guv3ha0YjuH8=;
Authentication-Results: sj-dkim-1; header.From=bew@cisco.com; dkim=pass ( sig from cisco.com/sjdkim1004 verified; );
Cc: tcpm@ietf.org, Allison Mankin <mankin@psg.com>, skonduru@juniper.net
Subject: Re: [tcpm] TCP-AO: Text for New_Key Process
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"; DelSp="yes"
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

Hi Joe,

On Jan 29, 2009, at 4:24 PM, Joe Touch wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
>
> Brian Weis wrote:
> ...
>> Joe mentioned a third approach. Summarizing the discussion, rather  
>> than
>> "probe" with segments that the TCP stack would already send, his
>> approach would add a signal to TCP segments noting that a new  
>> master key
>> was available. This helps a peer implementation make the decision to
>> move to a new key (i.e., the problem we're trying to solve) without
>> actually using the new key. This can break the deadlock without the
>> actual use of the new key.
>>
>> I favor this approach, but not the mechanism. Joe's idea consumes one
>> extra KeyID value for each real KeyID. The example given was to  
>> allocate
>> both KeyID 5 and KeyID 6 when using KeyID 5. Signaling the  
>> presence of a
>> new key comes by moving to KeyID 6. But overloading KeyIDs is not  
>> ideal
>> -- in particular, recall that KeyID values are chosen by some  
>> external
>> entity (e.g., a human or some automated key management system). I'm
>> really not confident that a human will always appreciate that they  
>> can
>> only configure "odd" KeyID values, for example. Furthermore, in  
>> order to
>> guarantee interoperability I believe that this would have to be
>> described in TCP-AO. We would want to avoid different implementations
>> have different conventions, and not be able to set the same  
>> KeyIDs! This
>> could be a fair amount of addition to TCP-AO.
>>
>> A better approach is to steal a bit from the KeyID field, and give it
>> the meaning "I have a new KeyID".
>
> The problem with this sort of bit is that we would need to know  
> when it
> is set and when it is clearable; this requires coordinating state
> between the endpoints.

Each TCP peer sets the bit independently, at such time as a new KeyID  
is provided to the local system that matches policy for an existing  
TCP session. I.e., the manual key management logic or automated key  
management system.

The station clears the bit when it begins transmitting with a new  
KeyID. It begins transmitting with the new KeyID because it observes  
the peer using the new KeyID (as described earlier in this thread).

> The flag has meaning only in the context of a particular keyID,  
> which is
> why it is equivalent to using a new keyID value. Further, using keyIDs
> allows the user/KMS/etc to have a variety of ways to pick new keys.
> E.g., if there are one of two possible future keys:
>
> 	key A = keyID 9
> 	key A = keyID 10
> 	key A = keyID 11
>
> 	keyB = keyID 12
> 	keyB = keyID 13
>
> Use keyID=9 for the 'old key' with no new changes pending. Use  
> keyID=11
> to signal use of key B, and use keyID=12 to signal use of keyID=13.
> There are other things that keyIDs can be used to coordinate - and  
> this
> is exactly why it's not useful to carve bits out for specific meaning.
> The meaning should be determined by the user/KMS.

Recall that TCP-AO is meant for BGP and LDP. Neither one needs much  
more than an "old key" and "new key" per peer. Going to the extent  
you describe here is way overkill. I know you don't like defining  
bits in a header, but sometimes they solve a simple problem in a  
straightforward way.

If there's really an application that needs what you describe above,  
it will be complicated enough that it will need automated KMS, and  
that KMS can instruct TCP-AO exactly which key it wants to be used  
using a local mechanism.

Brian

> Joe
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkmCSLUACgkQE5f5cImnZrs4QwCfdOq2iH4mXHVxlTmQETSBdLQD
> leEAn0GNipkeF66Et5lmaswnZ3+fQPTs
> =yjNn
> -----END PGP SIGNATURE-----

-- 
Brian Weis
Router/Switch Security Group, ARTG, Cisco Systems
Telephone: +1 408 526 4796
Email: bew@cisco.com

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm