Re: [tcpm] TCP-AO: Text for New_Key Process

Eric Rescorla <ekr@networkresonance.com> Fri, 30 January 2009 02:27 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C96583A6AA4; Thu, 29 Jan 2009 18:27:59 -0800 (PST)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 101953A6AA4 for <tcpm@core3.amsl.com>; Thu, 29 Jan 2009 18:27:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.561
X-Spam-Level:
X-Spam-Status: No, score=-2.561 tagged_above=-999 required=5 tests=[AWL=0.038, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UOZF9EElgsZv for <tcpm@core3.amsl.com>; Thu, 29 Jan 2009 18:27:58 -0800 (PST)
Received: from romeo.rtfm.com (romeo.rtfm.com [74.95.2.173]) by core3.amsl.com (Postfix) with ESMTP id 0F21B3A6870 for <tcpm@ietf.org>; Thu, 29 Jan 2009 18:27:58 -0800 (PST)
Received: from romeo.rtfm.com (localhost.rtfm.com [127.0.0.1]) by romeo.rtfm.com (Postfix) with ESMTP id E094750822; Thu, 29 Jan 2009 18:44:17 -0800 (PST)
Date: Thu, 29 Jan 2009 18:44:17 -0800
From: Eric Rescorla <ekr@networkresonance.com>
To: Joe Touch <touch@ISI.EDU>
In-Reply-To: <4981E474.6060402@isi.edu>
References: <7.1.0.9.2.20081219010400.02bfd3d8@gmail.com> <496d9941.18038e0a.5558.ffffd3a6@mx.google.com> <497F7DDC.70309@isi.edu> <20090128162756.3799450822@romeo.rtfm.com> <49808E94.8050107@isi.edu> <20090128175345.C434E50822@romeo.rtfm.com> <49809CBC.5080603@isi.edu> <20090129065500.243E550822@romeo.rtfm.com> <4981C803.8040504@isi.edu> <20090129155251.2136150823@romeo.rtfm.com> <4981E474.6060402@isi.edu>
User-Agent: Wanderlust/2.14.0 (Africa) Emacs/21.3 Mule/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka")
Message-Id: <20090130024417.E094750822@romeo.rtfm.com>
Cc: tcpm@ietf.org, Allison Mankin <mankin@psg.com>, skonduru@juniper.net
Subject: Re: [tcpm] TCP-AO: Text for New_Key Process
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

At Thu, 29 Jan 2009 09:16:36 -0800,
Joe Touch wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Hi, Eric (et al.),
> 
> To others - it might be useful to weigh in on this discussion...
> 
> Eric Rescorla wrote:
> > At Thu, 29 Jan 2009 07:15:15 -0800,
> ...
> >> We can bury the mechanism I suggest inside TCP-AO if desired, but I
> >> think that just ends up making it even more heavyweight. Automated key
> >> management is a mechanism that does not need to be inside TCP-AO - we
> >> were given that direction by the ADs from the start.
> > 
> > I don't consider this to be automated key management, and I don't
> > think it's very productive to argue about the direction from the ADs
> > gave us. My understanding from the discussion in MSP was that there
> > was general WG consensus that the protocol ought to include some
> > mechanism for automatic switchover of manually configured keys
> > without real-time coordination. The minutes aren't as explicit
> > as one might like but sort of reflect this when they say: 
> > 
> > "***ACTION*** GL will write the text up explaining all of this"
> 
> Greg was a proponent of it, and we were all interested in hearing what
> he was thinking; I don't recall anything beyond interest in seeing the
> details. Upon examining it in detail, it involves coupling directly with
> TCP exchanges in a way I think is out of scope based on what I recall
> the ADs saying - they can certainly remind us of what they're thinking
> now...

Well, as I said earlier, there are ways to do this that don't
couple to TCP. I.e., TCP-AO just chooses the occasional existing
packet to probe with. 



> > Well, you've now sort of reinvented the mechanism I originally
> > suggested and which is in Greg's message,
> 
> Not really; the difference is that in my example side A can tell side B
> it's ready to switch keys without ANY impact to side B; side B can
> switchover when its ready.

Yes, but you rely on correct receipt to confirm the switch.


> > but this is worse IMO because
> > substantial numbers of packets may be lost at one time before you can
> > switch over. 
> 
> Yes, packets are lost when you switchover and the key is wrong in my
> mechanism. However, NO packets are lost when the key is right, vs.
> Greg's mechanism which loses all probe packets until the other side is
> ready. The impact of the lost probes depends on the variant used; if no
> new TCP segments are generated, then the lost probes impact TCP's
> congestion control. 

Yeah, I'm having a really hard time getting worked up about the
impact of losing one packet every hour or so.


> > Granted, this only happens with misconfiguration but it
> > makes misconfiguration quite bad. And the logic around failure also
> > becomes quite complicated. How long do I wait before I decide the
> > other side has screwed up? 
> 
> IMO, that's the benefit - it's up to the user, not the TCP-AO
> implementation to decide that.

I don't consider that a benefit in terms of either interop or user confusion.

-Ekr
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm