Re: [tcpm] tcp-auth-opt issue: support for NATs

"Adam Langley" <agl@imperialviolet.org> Thu, 07 August 2008 00:41 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AEB093A6AAC; Wed, 6 Aug 2008 17:41:46 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2559D3A6AAC for <tcpm@core3.amsl.com>; Wed, 6 Aug 2008 17:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.383
X-Spam-Level:
X-Spam-Status: No, score=-1.383 tagged_above=-999 required=5 tests=[AWL=-0.006, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, J_CHICKENPOX_16=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5rbemjHhyhw5 for <tcpm@core3.amsl.com>; Wed, 6 Aug 2008 17:41:45 -0700 (PDT)
Received: from rv-out-0506.google.com (rv-out-0506.google.com [209.85.198.228]) by core3.amsl.com (Postfix) with ESMTP id 6033C3A677D for <tcpm@ietf.org>; Wed, 6 Aug 2008 17:41:45 -0700 (PDT)
Received: by rv-out-0506.google.com with SMTP id b25so154079rvf.49 for <tcpm@ietf.org>; Wed, 06 Aug 2008 17:42:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:sender :to:subject:cc:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references :x-google-sender-auth; bh=JAUhrBmIlVKeEcOIPR2r4MkRYo8r3E//3dvl+FlOhh4=; b=BIuFC3xRzq50UqoG2/2MsJ2SuzOhk8IhIFKCkD5QldFRSqGCA6LL5Kb1UMxrO1wnQ8 GfS6t3wEsvd3QA07hGXzBm2hjbnEne23WV70oBvgln9vyFLCai0AzcLVanFR6AMQ4wG5 V1WMDu+wHOhdUJlEIIpFhWywOwcYhcWbR1Uo8=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:sender:to:subject:cc:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references:x-google-sender-auth; b=pPTEuYwdBt65aoOfi6N4Jio2tIm2I4GRI0hlK8fdB6dOK8A2CbCOWgpeq++5eHaItS 5yE5FmmRspyjjWgs9MFcsqxElaMhR1C5AqPgaWzMnHoZhfk3/u5+7AkdIi/i7hxNaynm HymuCW+8sKcXC8XePc0TXgv1C504jDOyFPw5Q=
Received: by 10.141.164.13 with SMTP id r13mr20797rvo.53.1218069739538; Wed, 06 Aug 2008 17:42:19 -0700 (PDT)
Received: by 10.141.37.3 with HTTP; Wed, 6 Aug 2008 17:42:19 -0700 (PDT)
Message-ID: <396556a20808061742y19f8f5fh78fe66bfe4d415be@mail.gmail.com>
Date: Wed, 06 Aug 2008 17:42:19 -0700
From: Adam Langley <agl@imperialviolet.org>
To: Eric Rescorla <ekr@networkresonance.com>
In-Reply-To: <20080806020257.D1C69525D8F@kilo.rtfm.com>
MIME-Version: 1.0
Content-Disposition: inline
References: <4890F4BE.6060302@isi.edu> <396556a20807301622l4cb33deuff73cd13d7a75ba1@mail.gmail.com> <4890FBE8.1020203@isi.edu> <396556a20807311700w1eda50b0o5da7ae52e6c1691a@mail.gmail.com> <48935FFD.4090805@isi.edu> <396556a20808051826w1a839577q956f379f56db1165@mail.gmail.com> <20080806020257.D1C69525D8F@kilo.rtfm.com>
X-Google-Sender-Auth: 0cb8383f3b9d9340
Cc: tcpm@ietf.org, Joe Touch <touch@isi.edu>
Subject: Re: [tcpm] tcp-auth-opt issue: support for NATs
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

On Tue, Aug 5, 2008 at 7:02 PM, Eric Rescorla <ekr@networkresonance.com> wrote:
> Isn't the whole point of the key-ids to avoid requiring this?

Well, keyids would be required too. Here's how I see it working.

Define a synchronisation range, R, say 1 minute. We require that the
maximum skew between two clocks is R.

Define a key rotation timespan, T, say 1 minute. Let N be the maximum
number of keys that exist in a timespan of 2R. In our example, this is
two.

Define a function K(master, t) that maps a timestamp to a key derived
from a master key and a keyid in [0, N). For example, F(master, t) =
SHA1(master + uint32be (t/T)) with keyid (t/T) `mod` N.

At any time, a client transmits with key and keyid from F(master,
currentTime). At any time, the server accepts SYN signed with any
keyid and key in a span of 2R centered around the current time.

So one can only connect if one's clock skew is acceptable and one
knows the master key.

The keys for the resulting connection would be connection specific,
probably hashing in the SEQ/ACK numbers, other stuff etc.


AGL

-- 
Adam Langley agl@imperialviolet.org http://www.imperialviolet.org
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm