Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01

"Anantha Ramaiah (ananth)" <ananth@cisco.com> Tue, 29 July 2008 14:06 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8096228C332; Tue, 29 Jul 2008 07:06:42 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54E3628C329 for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 07:06:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.449
X-Spam-Level:
X-Spam-Status: No, score=-5.449 tagged_above=-999 required=5 tests=[AWL=-1.150, BAYES_00=-2.599, MANGLED_WANT=2.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tqgYZQ4UxExo for <tcpm@core3.amsl.com>; Tue, 29 Jul 2008 07:06:39 -0700 (PDT)
Received: from sj-iport-3.cisco.com (sj-iport-3.cisco.com [171.71.176.72]) by core3.amsl.com (Postfix) with ESMTP id A74CA28C330 for <tcpm@ietf.org>; Tue, 29 Jul 2008 07:06:38 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.31,272,1215388800"; d="scan'208";a="90822656"
Received: from sj-dkim-8.cisco.com ([171.68.10.93]) by sj-iport-3.cisco.com with ESMTP; 29 Jul 2008 14:06:51 +0000
Received: from sj-core-1.cisco.com (sj-core-1.cisco.com [171.71.177.237]) by sj-dkim-8.cisco.com (8.12.11/8.12.11) with ESMTP id m6TE6pjj006086; Tue, 29 Jul 2008 07:06:51 -0700
Received: from xbh-sjc-211.amer.cisco.com (xbh-sjc-211.cisco.com [171.70.151.144]) by sj-core-1.cisco.com (8.13.8/8.13.8) with ESMTP id m6TE6pXP005180; Tue, 29 Jul 2008 14:06:51 GMT
Received: from xmb-sjc-21c.amer.cisco.com ([171.70.151.176]) by xbh-sjc-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 29 Jul 2008 07:06:50 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 29 Jul 2008 07:05:42 -0700
Message-ID: <0C53DCFB700D144284A584F54711EC58058C3545@xmb-sjc-21c.amer.cisco.com>
In-Reply-To: <20080729135300.0E4AD4BD2AA@kilo.rtfm.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
Thread-Index: Acjxgn4xyK/jMJYiSGKAZhxhYqXkUwAARsvw
References: <20080728042451.C7A174B7AD3@kilo.rtfm.com><488D6968.9010102@isi.edu><20080728131254.3DD764B88F7@kilo.rtfm.com><488DD77D.9070608@isi.edu><20080728144721.AC9184B905A@kilo.rtfm.com><488DE021.7070307@isi.edu><396556a20807280931i257c6597o14cf45f8710611bf@mail.gmail.com><20080728164235.8DD974B96B6@kilo.rtfm.com><488E0749.4020402@isi.edu><396556a20807281106kfe6eb89sdb32d3836e508ea0@mail.gmail.com><0C53DCFB700D144284A584F54711EC58058C3506@xmb-sjc-21c.amer.cisco.com><488F1DE0.3060502@isi.edu> <20080729135300.0E4AD4BD2AA@kilo.rtfm.com>
From: "Anantha Ramaiah (ananth)" <ananth@cisco.com>
To: Eric Rescorla <ekr@networkresonance.com>, Joe Touch <touch@ISI.EDU>
X-OriginalArrivalTime: 29 Jul 2008 14:06:50.0892 (UTC) FILETIME=[58DD14C0:01C8F184]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=2639; t=1217340411; x=1218204411; c=relaxed/simple; s=sjdkim8002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=ananth@cisco.com; z=From:=20=22Anantha=20Ramaiah=20(ananth)=22=20<ananth@cisco .com> |Subject:=20RE=3A=20[tcpm]=20Review=20of=20draft-ietf-tcpm- tcp-auth-opt-01 |Sender:=20; bh=FFFXHm7+BTTuUaJYQwV8zOIGb7+t7eu4k8RJvA3Df3k=; b=xv4XV8R3a7eprHecFiJG7vH47WogqI/zSEZOEyYOl0uXIDEMd2Y2bJC1JD bVazr2Kpz27dtxQh7yx7AfDxRn/WbRpNMOhjWG8ZHtbgPPQw7az2kr8wM0N+ rqfzb1dS0S;
Authentication-Results: sj-dkim-8; header.From=ananth@cisco.com; dkim=pass ( sig from cisco.com/sjdkim8002 verified; );
Cc: Adam Langley <agl@imperialviolet.org>, tcpm@ietf.org
Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

 

> -----Original Message-----
> From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On 
> Behalf Of Eric Rescorla
> Sent: Tuesday, July 29, 2008 6:53 AM
> To: Joe Touch
> Cc: Adam Langley; tcpm@ietf.org; Anantha Ramaiah (ananth)
> Subject: Re: [tcpm] Review of draft-ietf-tcpm-tcp-auth-opt-01
> 
> At Tue, 29 Jul 2008 06:40:48 -0700,
> Joe Touch wrote:
> > 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> > 
> > 
> > 
> > Anantha Ramaiah (ananth) wrote:
> > | Folks,
> > |    The extended feeling which I get after watching some of the 
> > | conversation is that we seem to be in a cherry picking 
> mode of what 
> > | to include/exclude in the digest (MAC) computation. 
> (psuedo header, 
> > | TCP options etc.,)
> > |
> > | So, if we are going down that route, then I would argue it may be 
> > | worthwhile to debate "how much" to include in general, i.e, is it 
> > | worthwhile to include selective portions OR part of the 
> data portion 
> > | of the TCP data in the MAC computation instead of he entire data.?
> > 
> > Absolutely; that can be implemented inside the MAC 
> algorithm, opaquely 
> > to TCP-AO, though. I.e., I can create a MAC that hashes 
> only the odd 
> > blocks, only the first half of the blocks, etc.
> > 
> > Whether or not there are options to that MAC or not that need to be 
> > coordinated end-to-end is up to the key management system; e.g., 
> > parameters like "just the firs 10 bytes" can be encoded - again 
> > opaquely to TCP-AO - in the key used on a connection.
> 
> Well, it's true that one *could* do this, but I think it's a 
> really bad idea. MACs should provide a uniform interface and 
> set of semantics.
> If you want to have partial coverage, this should be handled 
> at the TCP-AO level.

I agree and that was what I was thinking when I was proposing this.

> 
> I appreciate that you're trying to isolate the crypto from 
> the TCP-AO service, but I don't think you can isolate it to 
> this extent.

Agreed. It needs to come from TCP-AO level even it means changing the
format of the TCP-AO option to accomadate this. As an end user of this
option I wan't to know how much was "digested" explicitly conveyed as
opposed to implicit schemes. Having this in TCP-AO allows a  per packet
granularity and that is good to have, IMO, if we are going down this
route.

-Anantha
> 
> -Ekr
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
> 
_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm