Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01

"Anantha Ramaiah (ananth)" <ananth@cisco.com> Tue, 29 July 2008 12:47 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 82F1B28C23D; Tue, 29 Jul 2008 05:47:36 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 750853A6B5A for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 05:47:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Cm1mmYHa8Ll for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 05:47:28 -0700 (PDT)
Received: from sj-iport-1.cisco.com (sj-iport-1.cisco.com [171.71.176.70]) by core3.amsl.com (Postfix) with ESMTP id EB21128C266 for <tcpm@ietf.org>; Tue, 29 Jul 2008 05:47:27 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.31,272,1215388800"; d="scan'208";a="58886982"
Received: from sj-dkim-4.cisco.com ([171.71.179.196]) by sj-iport-1.cisco.com with ESMTP; 29 Jul 2008 12:47:40 +0000
Received: from sj-core-2.cisco.com (sj-core-2.cisco.com [171.71.177.254]) by sj-dkim-4.cisco.com (8.12.11/8.12.11) with ESMTP id m6TClddo009038; Tue, 29 Jul 2008 05:47:39 -0700
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-2.cisco.com (8.13.8/8.13.8) with ESMTP id m6TClelV003596; Tue, 29 Jul 2008 12:47:40 GMT
Received: from xmb-sjc-21c.amer.cisco.com ([171.70.151.176]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 29 Jul 2008 05:47:39 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 29 Jul 2008 05:46:17 -0700
Message-ID: <0C53DCFB700D144284A584F54711EC58058C3506@xmb-sjc-21c.amer.cisco.com>
In-Reply-To: <396556a20807281106kfe6eb89sdb32d3836e508ea0@mail.gmail.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
Thread-Index: Acjw3NEVCYBgMOiRTJKL+z2goucxXgAmX6+A
References: <20080728042451.C7A174B7AD3@kilo.rtfm.com><488D6968.9010102@isi.edu> <20080728131254.3DD764B88F7@kilo.rtfm.com><488DD77D.9070608@isi.edu> <20080728144721.AC9184B905A@kilo.rtfm.com><488DE021.7070307@isi.edu><396556a20807280931i257c6597o14cf45f8710611bf@mail.gmail.com><20080728164235.8DD974B96B6@kilo.rtfm.com> <488E0749.4020402@isi.edu> <396556a20807281106kfe6eb89sdb32d3836e508ea0@mail.gmail.com>
From: "Anantha Ramaiah (ananth)" <ananth@cisco.com>
To: Adam Langley <agl@imperialviolet.org>, Joe Touch <touch@isi.edu>
X-OriginalArrivalTime: 29 Jul 2008 12:47:39.0690 (UTC) FILETIME=[48ED30A0:01C8F179]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=3240; t=1217335660; x=1218199660; c=relaxed/simple; s=sjdkim4002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=ananth@cisco.com; z=From:=20=22Anantha=20Ramaiah=20(ananth)=22=20<ananth@cisco .com> |Subject:=20RE=3A=20[tcpm]=20Review=20of=20draft-ietf-tcpm- tcp-auth-opt-01 |Sender:=20; bh=Qa57ACF/kcEkgQyPbStFeeDYG/qVMRmla2xAaIcptfk=; b=e0N0JjNyXWRoz4PdTrwE5mA173YRs/RfZbszyIXgvHYi4O+gwAfZAGD+gM yC0dQshxTnfu8Gv+mT3xOz7hdLwSAcxSUg+cA0fXG8v8EgZpzGfvJxaymP9D 78VQnyCnQd;
Authentication-Results: sj-dkim-4; header.From=ananth@cisco.com; dkim=pass ( sig from cisco.com/sjdkim4002 verified; );
Cc: tcpm@ietf.org
Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

Folks,
   The extended feeling which I get after watching some of the
conversation is that we seem to be in a cherry picking mode of what to
include/exclude in the digest (MAC) computation. (psuedo header, TCP
options etc.,)

So, if we are going down that route, then I would argue it may be
worthwhile to debate "how much" to include in general, i.e, is it
worthwhile to include selective portions OR part of the data portion of
the TCP data in the MAC computation instead of he entire data.?
Rationale and reasoning follows :-

- performance sensitive applications (in cases there are no hardware
assists for computing the crypto)
- the very reason of NAT (which you mnetion), yes, I am talking about
NAT ALG's which can muck around the data portion of the payload.

My point is that it boils down to how much flexibility one wants to
provide with the TCP AO. 

-Anantha

> -----Original Message-----
> From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On 
> Behalf Of Adam Langley
> Sent: Monday, July 28, 2008 11:07 AM
> To: Joe Touch
> Cc: tcpm@ietf.org
> Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
> 
> Some points from the discussion:
> 
> Regarding NATs:
> 
> Your reasoning, as I understood it, for not including an 
> option to exclude the pseudoheader and port numbers for NAT 
> traversal was that the host needs these items to lookup the 
> correct key anyway.
> 
> There are several situation where this is not the case. (I'll 
> point out that I see TCP-AO as being useful outside the 
> domain of securing BGP sessions between backbone routers)
> 
> 1) A host installs a key on a listening socket with a 
> wildcard address. Thus, one can only connect to the socket if 
> you know the key.
> The key probably rotates based on time. This is currently, 
> usually done based on "port knocking" - which has always 
> struck me as a messy solution. The resulting, ESTABLISHED 
> connection knows the port numbers and IP addresses without 
> having to establish it before hand.
> 
> 2) An unauthenticated connection is established and the 
> userland code wishes to upgrade to TCP-AO. Again, since the 
> connection is established the keyset to use are implicit. I 
> didn't know that the NONE mac was designed for upgrading like 
> this. In my Linux patches there's a TCP_AUTH_LATCH option 
> which means "accept unsigned packets until the first signed 
> packet, then require signatures".
> 
> In both of these cases, excluding port numbers and/or 
> pesudoheaders is needed given the deployment of NAT boxes 
> which change these headers.
> 
> 
> 
> Keyids:
> 
> I agree that keeping the cryptography in the MAC is a good thing.
> There is an implementation issue about the number of keys 
> that a kernel may have to store (80ish bytes per key * 256 
> keys * number of configured hosts), but that's not a spec problem.
> 
> 
> --
> Adam Langley agl@imperialviolet.org 
> http://www.imperialviolet.org 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
> 
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm