Re: [Tm-rid] HHIT trust proof for Auth messages

"Wiethuechter, Adam" <adam.wiethuechter@axenterprize.com> Tue, 01 October 2019 20:12 UTC

Return-Path: <adam.wiethuechter@axenterprize.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1126120043 for <tm-rid@ietfa.amsl.com>; Tue, 1 Oct 2019 13:12:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MHOPaBZ_n5_S for <tm-rid@ietfa.amsl.com>; Tue, 1 Oct 2019 13:12:01 -0700 (PDT)
Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 081AB120059 for <tm-rid@ietf.org>; Tue, 1 Oct 2019 13:12:00 -0700 (PDT)
Received: by mail-qk1-x730.google.com with SMTP id u186so12588203qkc.5 for <tm-rid@ietf.org>; Tue, 01 Oct 2019 13:12:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=vkkpnL2NQbwnFVQerasq3eIzJL0niGNPCmSAI02U37o=; b=iRpQ3i4+XGPyuxFDSyPkh6OdGTTew9ldttYGRYph2FYEd88yZrw1iGKX8aOq8BF+xX a1GoOouyOeWs+Bql237hkPEj6maIqLgtaUYneWfw756RDXwL06mq/Km5gveytdgXG3Te 1NpVRAND8FR0m5RjcNVjBNtw+c/z5BiAZfNlo=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vkkpnL2NQbwnFVQerasq3eIzJL0niGNPCmSAI02U37o=; b=TiFSE8Ecvgn0Q1QEKhxwoSs4DZ0PTOhZ2mFY3Mqn6Oit9iXVUTewIR9eW6+c9QLzeg mLqpfLqqsyt3fzngEiy68CiE6/C21ArGNZZcSrapqKp0+r3S1k2EzeYDH4wnrCAXLpMQ RYUUrLubA6WZZhz66WVzJDQF9xZWE3045uqqu6uBh80iXop1GL6ohASJZUQMxjPWZ0sP DNcDHKiN+bSJ81fqN6Q7GctLfmXHNta5sB3+TE4fhjP8j/wVW055g1f4W9qk+CCVSeSQ EaZJzuY4MDsgypPO0Dv8dbkiSa9Pz0XcoU8R+7prxIa5sBfSDP64EPD7nWkDAkM6G+nU 4kVg==
X-Gm-Message-State: APjAAAUqhHbJtbhjf4qxAklgM7qny+w+xhk+a6F0vbbpL+xJ7JUFyoEs 2phESLjdpV0C31Az8N0Z7P2Tf1Y6X0ibrezpwEix
X-Google-Smtp-Source: APXvYqxtyU18p8Gl4QaP+RDVrdAfjekjzU84mV/0O+UhTUHv+bMJYN1WmWD+zSFUl+IF2QC+wCURFzRxo5HkvpuNQG8=
X-Received: by 2002:a37:8f86:: with SMTP id r128mr8182088qkd.392.1569960719959; Tue, 01 Oct 2019 13:11:59 -0700 (PDT)
MIME-Version: 1.0
References: <c8342d06-203f-6f51-d227-12501a291fc7@labs.htt-consult.com> <CA+r8TqVNVOOCAipmTN5BqH3UGnpezsL748iLWnc7Ra=rVtD9sg@mail.gmail.com> <20302.1569955267@localhost>
In-Reply-To: <20302.1569955267@localhost>
From: "Wiethuechter, Adam" <adam.wiethuechter@axenterprize.com>
Date: Tue, 01 Oct 2019 16:11:46 -0400
Message-ID: <CA+r8TqXXzk370F9iEJ3c_-Ge2qYdUD_T74CMeCrhd5iWOLnL+w@mail.gmail.com>
To: Michael Richardson <mcr@sandelman.ca>
Cc: Robert Moskowitz <rgm@labs.htt-consult.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000065b340593def7af"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/Ur5YhZgTERSE92AVy6lgNyLdSKM>
Subject: Re: [Tm-rid] HHIT trust proof for Auth messages
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Oct 2019 20:12:05 -0000

Michael,

If you mean 4x23=92 bytes  (pages 0-3 of the auth message) which then
creates 23 bytes of parity; which I use to fill the final page, then yes.
However each time I look at what you wrote I come back with something
different in my head - rather annoying.

I haven't had much exposure to FECs other than seeing them in text and
knowing that it is being used in something; for instance Reed-Solomon,
which I think is a FEC, is used in Tahoe LAFS which I use often. I will
read up on them to get a better idea what you are saying.

On Tue, Oct 1, 2019 at 2:41 PM Michael Richardson <mcr@sandelman.ca> wrote:

>
> Wiethuechter, Adam <adam.wiethuechter@axenterprize.com> wrote:
>     > My concern, is that we are broadcasting over Bluetooth. There are 5
> pages
>     > to the authentication message (from my understanding of the new
> standard).
>     > If we lose any one page it is most likely going to be a signature
> page (as
>     > it spans 3 whole pages) and there will be no way to achieve that
> which this
>     > format is intended for without the full signature. Perhaps the
> payload
>     > section that Bob marked in (and fills the final page of the
> authentication
>     > message) should be some sort of error correction on the signature?
>
> I think what you have in mind is that you take the 5x25 = 100 bytes, and
> did a FEC to get 6x25 pages, such that one can lose any single page.
> Each page no longer can ever stand alone now, btw.
>
> --
> ]               Never tell me the odds!                 | ipv6 mesh
> networks [
> ]   Michael Richardson, Sandelman Software Works        |    IoT
> architect   [
> ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on
> rails    [
>
>

-- 
73's,
Adam T. Wiethuechter