Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
"Anantha Ramaiah (ananth)" <ananth@cisco.com> Tue, 29 July 2008 14:06 UTC
Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8096228C332; Tue, 29 Jul 2008 07:06:42 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54E3628C329 for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 07:06:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.449
X-Spam-Level:
X-Spam-Status: No, score=-5.449 tagged_above=-999 required=5 tests=[AWL=-1.150, BAYES_00=-2.599, MANGLED_WANT=2.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tqgYZQ4UxExo for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 07:06:39 -0700 (PDT)
Received: from sj-iport-3.cisco.com (sj-iport-3.cisco.com [171.71.176.72]) by core3.amsl.com (Postfix) with ESMTP id A74CA28C330 for <tcpm@ietf.org>; Tue, 29 Jul 2008 07:06:38 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.31,272,1215388800"; d="scan'208";a="90822656"
Received: from sj-dkim-8.cisco.com ([171.68.10.93]) by sj-iport-3.cisco.com with ESMTP; 29 Jul 2008 14:06:51 +0000
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237]) by sj-dkim-8.cisco.com (8.12.11/8.12.11) with ESMTP id m6TE6pjj006086; Tue, 29 Jul 2008 07:06:51 -0700
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m6TE6pXP005180; Tue, 29 Jul 2008 14:06:51 GMT
Received: from xmb-sjc-21c.amer.cisco.com ([171.70.151.176]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 29 Jul 2008 07:06:50 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 29 Jul 2008 07:05:42 -0700
Message-ID: <0C53DCFB700D144284A584F54711EC58058C3545@xmb-sjc-21c.amer.cisco.com>
In-Reply-To: <20080729135300.0E4AD4BD2AA@kilo.rtfm.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
Thread-Index: Acjxgn4xyK/jMJYiSGKAZhxhYqXkUwAARsvw
References: <20080728042451.C7A174B7AD3@kilo.rtfm.com><488D6968.9010102@isi.edu><20080728131254.3DD764B88F7@kilo.rtfm.com><488DD77D.9070608@isi.edu><20080728144721.AC9184B905A@kilo.rtfm.com><488DE021.7070307@isi.edu><396556a20807280931i257c6597o14cf45f8710611bf@mail.gmail.com><20080728164235.8DD974B96B6@kilo.rtfm.com><488E0749.4020402@isi.edu><396556a20807281106kfe6eb89sdb32d3836e508ea0@mail.gmail.com><0C53DCFB700D144284A584F54711EC58058C3506@xmb-sjc-21c.amer.cisco.com><488F1DE0.3060502@isi.edu> <20080729135300.0E4AD4BD2AA@kilo.rtfm.com>
From: "Anantha Ramaiah (ananth)" <ananth@cisco.com>
To: Eric Rescorla <ekr@networkresonance.com>, Joe Touch <touch@ISI.EDU>
X-OriginalArrivalTime: 29 Jul 2008 14:06:50.0892 (UTC) FILETIME=[58DD14C0:01C8F184]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2639; t=1217340411; x=1218204411; c=relaxed/simple; s=sjdkim8002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=ananth@cisco.com; z=From:=20=22Anantha=20Ramaiah=20(ananth)=22=20<ananth@cisco .com> |Subject:=20RE=3A=20[tcpm]=20Review=20of=20draft-ietf-tcpm- tcp-auth-opt-01 |Sender:=20; bh=FFFXHm7+BTTuUaJYQwV8zOIGb7+t7eu4k8RJvA3Df3k=; b=xv4XV8R3a7eprHecFiJG7vH47WogqI/zSEZOEyYOl0uXIDEMd2Y2bJC1JD bVazr2Kpz27dtxQh7yx7AfDxRn/WbRpNMOhjWG8ZHtbgPPQw7az2kr8wM0N+ rqfzb1dS0S;
Authentication-Results: sj-dkim-8; header.From=ananth@cisco.com; dkim=pass ( sig from cisco.com/sjdkim8002 verified; );
Cc: Adam Langley <agl@imperialviolet.org>, tcpm@ietf.org
Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org
> -----Original Message----- > From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On > Behalf Of Eric Rescorla > Sent: Tuesday, July 29, 2008 6:53 AM > To: Joe Touch > Cc: Adam Langley; tcpm@ietf.org; Anantha Ramaiah (ananth) > Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01 > > At Tue, 29 Jul 2008 06:40:48 -0700, > Joe Touch wrote: > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > > > > > Anantha Ramaiah (ananth) wrote: > > | Folks, > > | The extended feeling which I get after watching some of the > > | conversation is that we seem to be in a cherry picking > mode of what > > | to include/exclude in the digest (MAC) computation. > (psuedo header, > > | TCP options etc.,) > > | > > | So, if we are going down that route, then I would argue it may be > > | worthwhile to debate "how much" to include in general, i.e, is it > > | worthwhile to include selective portions OR part of the > data portion > > | of the TCP data in the MAC computation instead of he entire data.? > > > > Absolutely; that can be implemented inside the MAC > algorithm, opaquely > > to TCP-AO, though. I.e., I can create a MAC that hashes > only the odd > > blocks, only the first half of the blocks, etc. > > > > Whether or not there are options to that MAC or not that need to be > > coordinated end-to-end is up to the key management system; e.g., > > parameters like "just the firs 10 bytes" can be encoded - again > > opaquely to TCP-AO - in the key used on a connection. > > Well, it's true that one *could* do this, but I think it's a > really bad idea. MACs should provide a uniform interface and > set of semantics. > If you want to have partial coverage, this should be handled > at the TCP-AO level. I agree and that was what I was thinking when I was proposing this. > > I appreciate that you're trying to isolate the crypto from > the TCP-AO service, but I don't think you can isolate it to > this extent. Agreed. It needs to come from TCP-AO level even it means changing the format of the TCP-AO option to accomadate this. As an end user of this option I wan't to know how much was "digested" explicitly conveyed as opposed to implicit schemes. Having this in TCP-AO allows a per packet granularity and that is good to have, IMO, if we are going down this route. -Anantha > > -Ekr > > _______________________________________________ > tcpm mailing list > tcpm@ietf.org > https://www.ietf.org/mailman/listinfo/tcpm > _______________________________________________ tcpm mailing list tcpm@ietf.org https://www.ietf.org/mailman/listinfo/tcpm
- [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01 Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Adam Langley
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Adam Langley
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Adam Langley
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Anantha Ramaiah (ananth)
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Anantha Ramaiah (ananth)
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Anantha Ramaiah (ananth)
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Caitlin Bestler
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Joe Touch
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Lars Eggert
- Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt… Eric Rescorla
- [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Adam Langley
- Re: [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Adam Langley
- Re: [tcpm] tcp-auth-opt issue: replay protection Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Adam Langley
- Re: [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Lars Eggert
- Re: [tcpm] tcp-auth-opt issue: replay protection Eric Rescorla
- Re: [tcpm] tcp-auth-opt issue: replay protection Lars Eggert
- Re: [tcpm] tcp-auth-opt issue: replay protection Anantha Ramaiah (ananth)
- Re: [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Eddy, Wesley M. (GRC-RCN0)[VZ]
- Re: [tcpm] tcp-auth-opt issue: replay protection Adam Langley
- Re: [tcpm] tcp-auth-opt issue: replay protection Caitlin Bestler
- Re: [tcpm] tcp-auth-opt issue: replay protection Joe Touch
- Re: [tcpm] tcp-auth-opt issue: replay protection Ron Bonica