Re: [tcpm] tcp-auth-opt issue: support for NATs

"Dan Wing" <dwing@cisco.com> Mon, 11 August 2008 19:32 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6F0D3A6D11; Mon, 11 Aug 2008 12:32:56 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 279E63A6C33 for <tcpm@core3.amsl.com>; Mon, 11 Aug 2008 12:32:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GleQrTsvUuZ6 for <tcpm@core3.amsl.com>; Mon, 11 Aug 2008 12:32:54 -0700 (PDT)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id 283C93A6D23 for <tcpm@ietf.org>; Mon, 11 Aug 2008 12:32:54 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,190,1217808000"; d="scan'208";a="64130053"
Received: from sj-dkim-3.cisco.com ([171.71.179.195]) by sj-iport-1.cisco.com with ESMTP; 11 Aug 2008 19:32:41 +0000
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238]) by sj-dkim-3.cisco.com (8.12.11/8.12.11) with ESMTP id m7BJWfdg029840; Mon, 11 Aug 2008 12:32:41 -0700
Received: from dwingwxp01 (dhcp-171-70-217-35.cisco.com [171.70.217.35]) by sj-core-5.cisco.com (8.13.8/8.13.8) with ESMTP id m7BJWf1F016196; Mon, 11 Aug 2008 19:32:41 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Eric Rescorla' <ekr@networkresonance.com>, 'Ron Bonica' <rbonica@juniper.net>
References: <4890F4BE.6060302@isi.edu><396556a20807301622l4cb33deuff73cd13d7a75ba1@mail.gmail.com><4890FBE8.1020203@isi.edu><396556a20807311700w1eda50b0o5da7ae52e6c1691a@mail.gmail.com><48935FFD.4090805@isi.edu><396556a20808051826w1a839577q956f379f56db1165@mail.gmail.com><20080806020257.D1C69525D8F@kilo.rtfm.com><396556a20808061742y19f8f5fh78fe66bfe4d415be@mail.gmail.com><20080807011812.DDC8050846@romeo.rtfm.com><396556a20808071047q5bda8acbje7a8fc9f9bf2e597@mail.gmail.com><20080807180512.77604529E4D@kilo.rtfm.com><489B3B72.8030604@isi.edu> <48A08295.8090903@juniper.net> <20080811184214.B300B50846@romeo.rtfm.com>
Date: Mon, 11 Aug 2008 12:32:41 -0700
Message-ID: <03d901c8fbe9$05673220$23d946ab@cisco.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
In-Reply-To: <20080811184214.B300B50846@romeo.rtfm.com>
X-Mimeole: Produced By Microsoft MimeOLE V6.00.2900.3198
Thread-Index: Acj74KY41cicHo6WSamkTFjpBn6uRgAB/y4A
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=1095; t=1218483161; x=1219347161; c=relaxed/simple; s=sjdkim3002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=dwing@cisco.com; z=From:=20=22Dan=20Wing=22=20<dwing@cisco.com> |Subject:=20RE=3A=20[tcpm]=20tcp-auth-opt=20issue=3A=20supp ort=20for=20NATs |Sender:=20; bh=PEKt4+xr2G/+caAToFhHGxMIIW1X9PaLz7bFdnrjaGg=; b=mfqpjYn3kIUaJjrcIdIVmNf0bWDxFu4/HMg8+YhR7XHtLdfT7GAPEI/h5t 2N9JHgaUi3SFY1XrxKsQdyletBPAum3jhB33qqEBf1vhFGLwREVS3FozSSSE LQ8wIDdZQY;
Authentication-Results: sj-dkim-3; header.From=dwing@cisco.com; dkim=pass ( sig from cisco.com/sjdkim3002 verified; );
Cc: 'Adam Langley' <agl@imperialviolet.org>, tcpm@ietf.org, 'Joe Touch' <touch@ISI.EDU>
Subject: Re: [tcpm] tcp-auth-opt issue: support for NATs
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

> At Mon, 11 Aug 2008 14:19:01 -0400,
> Ron Bonica wrote:
> > 
> > 
> > > That's a reason we have a keyID, which, together with the 
> socket pair,
> > > should exactly specify what key to use and avoids this 
> sort of trial.
> > 
> > Amen!
> > 
> >   If
> > > we can live with trials, we can remove the keyID and 
> things align much
> > > better.
> > > 
> > 
> > But we can't!
> 
> If we can't ever have trial authentication than there must be a unique
> key for each (key-id, remote addr) pair. As a practical matter,
> this implies either that:
> 
> - Key-ids must be globally unique.
> - You need to know the other side's IP address, even if you're doing
>   a passive open.

Adding 32 bits to the key-id would create the same global uniqueness
that using the source IPv4 addresses accomplishes.

But it's only necessary to have a globally unique key-id when a new
connection arrives:  after that, you can use the source IP address
and TCP port.  A reasonable optimization could involve using a 
shorter key-id after the TCP session is established.

-d

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm