Re: [tcpm] AO-04: proposed text for describing all the traffic keys

Joe Touch <touch@ISI.EDU> Mon, 23 March 2009 18:58 UTC

Return-Path: <touch@ISI.EDU>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 170D63A6B32 for <tcpm@core3.amsl.com>; Mon, 23 Mar 2009 11:58:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.399
X-Spam-Level:
X-Spam-Status: No, score=-1.399 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_14=0.6, J_CHICKENPOX_21=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 79ZIzIdpsktM for <tcpm@core3.amsl.com>; Mon, 23 Mar 2009 11:58:18 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id 0CAC73A6B1D for <tcpm@ietf.org>; Mon, 23 Mar 2009 11:58:18 -0700 (PDT)
Received: from [75.210.1.40] (40.sub-75-210-1.myvzw.com [75.210.1.40]) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id n2NIvmm6016436; Mon, 23 Mar 2009 11:57:50 -0700 (PDT)
Message-ID: <49C7DBAB.7080808@isi.edu>
Date: Mon, 23 Mar 2009 11:57:47 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.21 (Windows/20090302)
MIME-Version: 1.0
To: "Gregory M. Lebovitz" <gregory.ietf@gmail.com>
References: <49c7c974.1d078e0a.1586.ffffee09@mx.google.com>
In-Reply-To: <49c7c974.1d078e0a.1586.ffffee09@mx.google.com>
X-Enigmail-Version: 0.95.7
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: tcpm@ietf.org
Subject: Re: [tcpm] AO-04: proposed text for describing all the traffic keys
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Mar 2009 18:58:19 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

See end of section 7.2, which describes the four keys, their derivation,
and their use.

Joe

Gregory M. Lebovitz wrote:
> I sent this to Joe before -04 was published, but he didn't have time to
> include it. I send it to list for review. I believe this text makes it
> quite explicit how many traffic keys for each connection there will be,
> and how they are contructed.
> 
>     > === BEGIN TEXT =====
>     > Because the Traffic key is created with conn_block as an input,
>     and part
>     > of Conn_block is the SourceISN and DestinationISN, each peer will
>     > generate multiple direction-specific traffic keys for each TCP
>     > connection in the following format:
>     >
>     >     Kx,y^N = F(s, d)
>     >
>     > Where:
>     >    a - Alice, the initiator of the TCP connection,
>     >    b - Bob, the other end-point in the TCP connection,
>     >    Kx,y - Conn_Key of directionality x,y , where x is the segment
>     > source, either a or b, and y is the segment destination, either b
>     or a,
>     >    ^N - where N is an integer labeling a unique traffic key for a
>     > specific sender for this connection,
>     >    F - abstractly, the funtion of the KDF where the elements
>     within the
>     > parenthesis are changing variables, and all other KDF elements are
>     > understood as held constant, or irrelevant to the description,
>     >   (s, d) - where h is the Source ESN and i is the Destination ESN,
>     >
>     > Following this format, the traffic keys generated on Alice and Bob
>     > respectively for a normal, one way open TCP connection will be
>     three each:
>     >
>     >         ALICE                               BOB
>     >        ========                           ========
>     >
>     > 1|  Ka,b^1 = F(ISNa, 0)    ------->  Ka,b^1 = F(ISNa, 0)
>     > 2|  Kb,a^2 = F(ISNb, ISNa) <-------  Kb,a^2 = F(ISNb,ISNa)
>     > 3|  Ka,b^3 = F(ISNa, ISNb) ------->  Ka,b^3 = F(ISNa, ISNb)
>     >
>     >
>     > In the above,
>     >    - line 1 is a SYN from a to b.
>     >    - line 2 is a SYN/ACK segment from b to a
>     >    - line 3 is an ACK segment from a to b
>     >
>     > Thus, in the simple case, each side creates 3 Traffic keys, ^1,
>     ^2, and ^3.
>     > In the more rare case where there is a simultaneous open [REF??], each
>     > side will generate four traffic keys:
>     >
>     > 1|  Ka,b^1 = F(ISNa, 0)    ------->  Ka,b^1 = F(ISNa, 0)
>     > 2|  Kb,a^2 = F(ISNb, 0)    <-------  Kb,a^2 = F(ISNb, 0)
>     > 3|  Kb,a^3 = F(ISNb, ISNa) <-------  Kb,a^3 = F(ISNb,ISNa)
>     > 4|  Ka,b^4 = F(ISNa, ISNb) ------->  Ka,b^4 = F(ISNa, ISNb)
>     >
>     > In the above,
>     >    - line 1 is a SYN from a to b.
>     >    - line 2 is a possible simultaneous open SYN from b to a
>     >    - line 3 is a SYN/ACK segment from b to a
>     >    - line 4 is an ACK segment from a to b
>     > === END TEXT ======
> 
> Thoughts?
> 
> Gregory.
> 
> +++++++++++++++++++++++
> IETF-related email from
> Gregory M. Lebovitz
> Juniper Networks
> g r e go r  y d o t  i e tf a t  g m a i l  do t c o  m
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAknH26sACgkQE5f5cImnZrt05QCfekYPs+TgPvlP8qzn7GzTe+71
hw0AoOkA+Nk40WMaCLuV8pEjpY6K7u+T
=6XS2
-----END PGP SIGNATURE-----