Re: [tcpm] tcp-auth-opt issue: support for NATs
"Adam Langley" <agl@imperialviolet.org> Wed, 06 August 2008 01:26 UTC
Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 55F6E3A688D; Tue, 5 Aug 2008 18:26:07 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0BFD83A68A8 for <tcpm@core3.amsl.com>; Tue, 5 Aug 2008 18:26:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.657
X-Spam-Level:
X-Spam-Status: No, score=-1.657 tagged_above=-999 required=5 tests=[AWL=0.320, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v7vdXkk2jgOV for <tcpm@core3.amsl.com>; Tue, 5 Aug 2008 18:26:05 -0700 (PDT)
Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.233]) by core3.amsl.com (Postfix) with ESMTP id 2CF9F3A67E5 for <tcpm@ietf.org>; Tue, 5 Aug 2008 18:26:05 -0700 (PDT)
Received: by rv-out-0506.google.com with SMTP id b25so2433924rvf.49 for <tcpm@ietf.org>; Tue, 05 Aug 2008 18:26:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender :to:subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references :x-google-sender-auth; bh=y4GP/Mryt5RjPJvQ2x65xL8BNW/9lVS+tNEv2Jat4a0=; b=XXYnhJ9eGcev06UoDK8K1SX/0fnky4avIkRohnm3tFmz14rP0eQNBDGidBBLsMoyqC OiVnM12t/0GS7quch6lLqqqxp30oWK1h1OQ49mQDfX+tfVyTN4b8oLyW1RqSCpW6BS9V Rpgt7mcDhNdT3xoZH9fGqD/Nra8QyysduN34Q=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references:x-google-sender-auth; b=J1ZjhCgoRcjCaZRp1yeh6AUQ35o6mnRpg7ewdBCqoTqvNxKmpOfR8sYFb9TiOzyhYi GomGqiVRIrIAuN+SzCkU0/RA7pfGpfuoTaaCDhk84sMf2ZLdlZAUa42Byg8rBvYQ4IEO nUh3aT8/w+D5YCEvWxdXVXIeqloZ+T245JANA=
Received: by 10.141.132.1 with SMTP id j1mr8570061rvn.64.1217985996798; Tue, 05 Aug 2008 18:26:36 -0700 (PDT)
Received: by 10.141.37.3 with HTTP; Tue, 5 Aug 2008 18:26:36 -0700 (PDT)
Message-ID: <396556a20808051826w1a839577q956f379f56db1165@mail.gmail.com>
Date: Tue, 05 Aug 2008 18:26:36 -0700
From: Adam Langley <agl@imperialviolet.org>
To: Joe Touch <touch@isi.edu>
In-Reply-To: <48935FFD.4090805@isi.edu>
MIME-Version: 1.0
Content-Disposition: inline
References: <4890F4BE.6060302@isi.edu> <396556a20807301622l4cb33deuff73cd13d7a75ba1@mail.gmail.com> <4890FBE8.1020203@isi.edu> <396556a20807311700w1eda50b0o5da7ae52e6c1691a@mail.gmail.com> <48935FFD.4090805@isi.edu>
X-Google-Sender-Auth: c2dd3df7e02fdcb0
Cc: tcpm@ietf.org
Subject: Re: [tcpm] tcp-auth-opt issue: support for NATs
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org
On Fri, Aug 1, 2008 at 12:11 PM, Joe Touch <touch@isi.edu> wrote: > Key rotations (presumably you're talking about the master key) may > require some synchronization, which seems unlikely in the case of NATs > as well. A time based key rotation would only require that endpoints have synchronised clocks to within an arbitrary amount of time. A minute would seem reasonable. > There are a few questions that may be useful to address to move forward: > > - is the use of wildcards/ingore addrs/ports compatible with > the desire for unique per-connection keys? Unless the SEQ/ACK randomness is compromised, 64-bits of random data should be enough I believe. If the randomness *is* compromised, then adding in the ports and addresses to the calculation does little for security since those values are known. > - is it OK to require that all NAT'd clients use the same > key In the cases where people would consider setting things up this way (when manual/automatic key distribution is too burdensome) then I would suggest, yes. > - is it OK to require that support for NATs means > using wildcard'd keys? Again, I would say yes. Noting that this scheme (wildcarding keys) does not prohibit manual or automatic key distribution. It's simply a low-setup-cost addition to those schemes. AGL -- Adam Langley agl@imperialviolet.org http://www.imperialviolet.org _______________________________________________ tcpm mailing list tcpm@ietf.org https://www.ietf.org/mailman/listinfo/tcpm
- [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch
- Re: [tcpm] tcp-auth-opt issue: support for NATs Adam Langley
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Anantha Ramaiah (ananth)
- Re: [tcpm] tcp-auth-opt issue: support for NATs Dan Wing
- Re: [tcpm] tcp-auth-opt issue: support for NATs Dan Wing
- Re: [tcpm] tcp-auth-opt issue: support for NATs Ron Bonica
- Re: [tcpm] tcp-auth-opt issue: support for NATs Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: support for NATs Dan Wing
- Re: [tcpm] tcp-auth-opt issue: support for NATs Ted Faber
- Re: [tcpm] tcp-auth-opt issue: support for NATs Dan Wing
- Re: [tcpm] tcp-auth-opt issue: support for NATs Joe Touch