From msec-admin@securemulticast.org  Fri Apr  9 09:22:18 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA26612
	for <msec-archive@lists.ietf.org>; Fri, 9 Apr 2004 09:22:13 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id D3364539FD; Fri,  9 Apr 2004 09:21:35 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 044AA538E6
	for <msec@lists.securemulticast.org>; Fri,  9 Apr 2004 09:19:46 -0400 (EDT)
Received: (qmail 46230 invoked by uid 3269); 9 Apr 2004 13:19:45 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 46225 invoked from network); 9 Apr 2004 13:19:44 -0000
Received: from smtp8.clb.oleane.net (213.56.31.28)
  by klesh.pair.com with SMTP; 9 Apr 2004 13:19:44 -0000
Received: from paviliondeux ([194.206.151.59]) 
	by smtp8.clb.oleane.net with ESMTP id i39DJhgh026794
	for <msec@securemulticast.org>; Fri, 9 Apr 2004 15:19:43 +0200
Message-Id: <200404091319.i39DJhgh026794@smtp8.clb.oleane.net>
From: "peter" <peter.lewis@upperside.fr>
To: <msec@securemulticast.org>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_000F_01C41E46.163061B0"
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
Thread-Index: AcQeNVJYrYW0BTNFQH2wTTl8QcOwNQ==
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Subject: [MSEC] SSL VPN Conference
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 9 Apr 2004 15:19:43 +0200

This is a multi-part message in MIME format.

------=_NextPart_000_000F_01C41E46.163061B0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

 

. How to provide SSL-based remote access to a broad range of Web and
legacy applications? 
. What about application performance and requirements?
. Are encrypted application tunneling issues solved? 
. What differences with IPsec VPNs?

These questions, among others, will be tackled by the most recognised
experts in this field during the SSL VPN Conference to be held in Paris from
November 30th to the 3rd of December, 2004.

 

A call for proposals is online at:

 <http://www.upperside.fr/sslvpn04/sslvpn04intro.htm>
http://www.upperside.fr/sslvpn04/sslvpn04intro.htm

 


------=_NextPart_000_000F_01C41E46.163061B0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Batang;
	panose-1:2 3 6 0 0 1 1 1 1 1;}
@font-face
	{font-family:"\@Batang";
	panose-1:0 0 0 0 0 0 0 0 0 0;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:Arial;
	color:windowtext;}
@page Section1
	{size:595.3pt 841.9pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DFR link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
lang=3DEN-GB
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><strong><b><font size=3D3 color=3D"#e5a700" =
face=3DArial><span
lang=3DEN-GB =
style=3D'font-size:12.0pt;font-family:Arial;color:#E5A700'>&#8226; =
</span></font></b></strong><font
face=3DArial><span lang=3DEN-GB style=3D'font-family:Arial'>How to =
provide SSL-based
remote access to a broad range of Web and &nbsp;&nbsp;legacy =
applications? <br>
<strong><b><font color=3D"#e5a700" face=3DArial><span =
style=3D'font-family:Arial;
color:#E5A700'>&#8226; </span></font></b></strong>What about application
performance and requirements?<br>
<strong><b><font color=3D"#e5a700" face=3DArial><span =
style=3D'font-family:Arial;
color:#E5A700'>&#8226; </span></font></b></strong>Are encrypted =
application
tunneling issues solved? <br>
<strong><b><font color=3D"#e5a700" face=3DArial><span =
style=3D'font-family:Arial;
color:#E5A700'>&#8226; </span></font></b></strong>What differences with =
IPsec
VPNs?<br>
<br>
These questions, among others, will be tackled by the most recognised =
experts
in this field during the <strong><b><font color=3D"#015d6c" =
face=3DArial><span
style=3D'font-family:Arial;color:#015D6C'>SSL VPN =
Conference</span></font></b></strong>
to be held in <st1:City w:st=3D"on"><st1:place =
w:st=3D"on">Paris</st1:place></st1:City>
from November <span class=3Dtextebold>30th to the 3rd of December, =
2004</span>.</span></font><span
lang=3DEN-GB><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
lang=3DEN-GB
style=3D'font-size:12.0pt'>&nbsp;<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D3 face=3DArial><span lang=3DEN-GB =
style=3D'font-size:
12.0pt;font-family:Arial'>A call for proposals is online =
at:</span></font><span
lang=3DEN-GB><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D3 face=3DArial><span =
style=3D'font-size:12.0pt;
font-family:Arial'><a =
href=3D"http://www.upperside.fr/sslvpn04/sslvpn04intro.htm"
title=3D"http://www.upperside.fr/sslvpn04/sslvpn04intro.htm"><span =
lang=3DEN-GB>http://www.upperside.fr/sslvpn04/sslvpn04intro.htm</span></a=
></span></font><span
lang=3DEN-GB><o:p></o:p></span></p>

<p class=3DMsoNormal><font size=3D2 face=3DArial><span lang=3DEN-GB =
style=3D'font-size:
10.0pt;font-family:Arial'><o:p>&nbsp;</o:p></span></font></p>

</div>

</body>

</html>

------=_NextPart_000_000F_01C41E46.163061B0--


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Wed Apr 14 14:45:58 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA14072
	for <msec-archive@lists.ietf.org>; Wed, 14 Apr 2004 14:45:58 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 49FB8539D3; Wed, 14 Apr 2004 14:45:25 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 600CA53751
	for <msec@lists.securemulticast.org>; Tue, 13 Apr 2004 12:07:05 -0400 (EDT)
Received: (qmail 68097 invoked by uid 3269); 13 Apr 2004 16:07:02 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 68094 invoked from network); 13 Apr 2004 16:07:02 -0000
Received: from go4.ext.ti.com (192.91.75.132)
  by klesh.pair.com with SMTP; 13 Apr 2004 16:07:02 -0000
Received: from dlep91.itg.ti.com ([157.170.152.55])
	by go4.ext.ti.com (8.12.11/8.12.11) with ESMTP id i3DG70U7001887;
	Tue, 13 Apr 2004 11:07:00 -0500 (CDT)
Received: from gtmentos.telogy.design.ti.com (localhost [127.0.0.1])
	by dlep91.itg.ti.com (8.12.11/8.12.11) with ESMTP id i3DG6xVX002886;
	Tue, 13 Apr 2004 11:06:59 -0500 (CDT)
Received: by gtmentos.telogy.design.ti.com with Internet Mail Service (5.5.2653.19)
	id <2FGG04TX>; Tue, 13 Apr 2004 12:06:59 -0400
Message-ID: <A03FFB626FA02D4A9C68DBA5B228AF1E0798E4@gtmentos.telogy.design.ti.com>
From: "Ibrahim, Maideen" <mibrahim@telogy.com>
To: "'msec@securemulticast.org'" <msec@securemulticast.org>,
        "'elisabetta.carrara@ericsson.com'" <elisabetta.carrara@ericsson.com>
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C42171.56A37330"
Subject: [MSEC] MIKEY DH related doubts
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Tue, 13 Apr 2004 12:06:54 -0400

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C42171.56A37330
Content-Type: text/plain

Hi,

 

I am trying to find out the answers for the following questions. I am
implementing MIKEY for key management for SIP.

 

1. MIKEY supports DH key exchange by having a separate payload and a value
in the common header. When Iooked into section 6.4
(ietf-draft-msec-mikey-08.txt) for DH payload, I don't see much explanations
for DH group and DH value. What is DH group? Does DH value denote the g^s *
p (g - generator, s - secret number, p - big prime number)?

2. DH needs p (prime) and g (generator) to be public. How these numbers are
exchanged using MIKEY? or Is it to be static, known to communicators by
other means??

 

Thanks,

Maideen


------_=_NextPart_001_01C42171.56A37330
Content-Type: text/html

<html>

<head>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">


<meta name=Generator content="Microsoft Word 10 (filtered)">

<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{font-family:Arial;
	color:windowtext;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=EN-US link=blue vlink=purple>

<div class=Section1>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>Hi,</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>I am trying to find out the answers for the following
questions. I am implementing MIKEY for key management for SIP.</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>1. MIKEY supports DH key exchange by having a separate
payload and a value in the common header. When Iooked into section 6.4 (ietf-draft-msec-mikey-08.txt)
for DH payload, I don't see much explanations for DH group and DH value. What
is DH group? Does DH value denote the g^s * p (g - generator, s -
secret number, p - big prime number)?</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>2. DH needs p (prime) and g (generator) to be public. How
these numbers are exchanged using MIKEY? or Is it to be static, known to
communicators by other means??</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>&nbsp;</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>Thanks,</span></font></p>

<p class=MsoNormal><font size=2 face=Arial><span style='font-size:10.0pt;
font-family:Arial'>Maideen</span></font></p>

</div>

</body>

</html>

------_=_NextPart_001_01C42171.56A37330--

_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 23 13:28:40 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA22079
	for <msec-archive@lists.ietf.org>; Fri, 23 Apr 2004 13:28:39 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 5CBCD538C1; Fri, 23 Apr 2004 13:28:08 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 5CD8453758
	for <msec@lists.securemulticast.org>; Fri, 23 Apr 2004 13:27:09 -0400 (EDT)
Received: (qmail 54863 invoked by uid 3269); 23 Apr 2004 17:27:09 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 54859 invoked from network); 23 Apr 2004 17:27:09 -0000
Received: from zcars0m9.nortelnetworks.com (47.129.242.157)
  by klesh.pair.com with SMTP; 23 Apr 2004 17:27:09 -0000
Received: from zbl6c012.us.nortel.com (zbl6c012.us.nortel.com [132.245.205.62])
	by zcars0m9.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP id i3NHQfD10044;
	Fri, 23 Apr 2004 13:26:41 -0400 (EDT)
Received: from zbl6c002.us.nortel.com (zbl6c002.corpeast.baynetworks.com [132.245.205.52]) by zbl6c012.us.nortel.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id JC3AR374; Fri, 23 Apr 2004 13:26:40 -0400
Received: from nortelnetworks.com (atices-1.us.nortel.com [47.16.67.20]) by zbl6c002.us.nortel.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id JCN02JB9; Fri, 23 Apr 2004 13:26:40 -0400
Message-ID: <408951D0.3040803@nortelnetworks.com>
X-Sybari-Space: 00000000 00000000 00000000 00000000
From: "Dondeti, Lakshminath" <ldondeti@nortelnetworks.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Mark Baugher <mbaugher@cisco.com>, elisabetta.carrara@ericsson.com
Cc: msec@securemulticast.org
Subject: Re: [MSEC] draft-ietf-msec-srtp-tesla-00.txt
References: <6.0.0.22.2.20040206164008.038c5ad8@mira-sjc5-6.cisco.com>
In-Reply-To: <6.0.0.22.2.20040206164008.038c5ad8@mira-sjc5-6.cisco.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 23 Apr 2004 13:26:40 -0400
Content-Transfer-Encoding: 7bit

Hi Mark/Elisabetta,

I have a couple of questions on the SRTP-TESLA I-D:

1. In Figure 1, and the associated text:

Isn't Id optional?  Also, is it a variable length payload, or do you 
plan to suggest a key chain length?

2.  Figure 2 indicates that the disclosed TESLA key is in the clear.

Is that intended?  I thought about it a little bit: it might not be 
directly useful for an attacker as that key is not going to be used to 
authenticate any future/current traffic, but why disclose a key from the 
key chain if it can be avoided.  Any thoughts on this.

Nit:  Please replace MAC with ICV or auth tag or something like that.

thanks,
Lakshminath

Mark Baugher wrote:

> Dear Internet Drafts Editor:
> Please post the version 0 draft of the following draft
> http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt
>
> This is an official msec working group I-D.  Please notify 
> msec@securemulticast.org.
>
> thanks, Mark
>
>
> _______________________________________________
> msec mailing list
> msec@securemulticast.org
> http://www.pairlist.net/mailman/listinfo/msec
>


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 23 14:10:36 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24169
	for <msec-archive@lists.ietf.org>; Fri, 23 Apr 2004 14:10:35 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 9469153800; Fri, 23 Apr 2004 14:10:05 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id CBDCA5371B
	for <msec@lists.securemulticast.org>; Fri, 23 Apr 2004 14:08:16 -0400 (EDT)
Received: (qmail 64467 invoked by uid 3269); 23 Apr 2004 18:08:16 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 64460 invoked from network); 23 Apr 2004 18:08:16 -0000
Received: from sj-iport-4.cisco.com (171.68.10.86)
  by klesh.pair.com with SMTP; 23 Apr 2004 18:08:16 -0000
Received: from mbaugher-w2k07.cisco.com (sjc-vpn1-871.cisco.com [10.21.99.103])
	by sj-core-4.cisco.com (8.12.10/8.12.6) with ESMTP id i3NI8BjP002834;
	Fri, 23 Apr 2004 11:08:12 -0700 (PDT)
Message-Id: <6.0.0.22.2.20040423104816.042d7138@mira-sjc5-6.cisco.com>
X-Sender: mbaugher@mira-sjc5-6.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 6.0.0.22
To: "Dondeti, Lakshminath" <ldondeti@nortelnetworks.com>
From: Mark Baugher <mbaugher@cisco.com>
Subject: Re: [MSEC] draft-ietf-msec-srtp-tesla-00.txt
Cc: elisabetta.carrara@ericsson.com, msec@securemulticast.org
In-Reply-To: <408951D0.3040803@nortelnetworks.com>
References: <6.0.0.22.2.20040206164008.038c5ad8@mira-sjc5-6.cisco.com>
 <408951D0.3040803@nortelnetworks.com>
Mime-Version: 1.0
Content-Type: multipart/alternative;
	boundary="=====================_64589644==.ALT"
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 23 Apr 2004 11:08:06 -0700

--=====================_64589644==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

Hello Lakshminath,

At 10:26 AM 4/23/2004, Dondeti, Lakshminath wrote:
>Hi Mark/Elisabetta,
>
>I have a couple of questions on the SRTP-TESLA I-D:
>
>1. In Figure 1, and the associated text:
>
>Isn't Id optional?  Also, is it a variable length payload, or do you plan 
>to suggest a key chain length?

I did not think that would be wise since section 6.2 of 
http://www.ietf.org/internet-drafts/draft-ietf-msec-srtp-tesla-00.txt and 
the length is fixed according to 6.2.


>2.  Figure 2 indicates that the disclosed TESLA key is in the clear.

The only key I see in Figure 2 is "Disclosed Key" - and yes this is 
disclosed to prove the authenticity of the previous message (see section 6.2).


>Is that intended?  I thought about it a little bit: it might not be 
>directly useful for an attacker as that key is not going to be used to 
>authenticate any future/current traffic, but why disclose a key from the 
>key chain if it can be avoided.  Any thoughts on this.

That's how I understand this thing to work, Lakshminath, from
http://www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf 
on page 2:
"
The main idea of TESLA is that the sender attaches
to each packet a MAC computed with a key k known
only to itself. The receiver buffers the received packet
without being able to authenticate it. A short while
later, the sender discloses k and the receiver is able to
authenticate the packet. Consequently, a single MAC
per packet suffices to provide broadcast authentication,
provided that the receiver has synchronized its
clock with the sender ahead of time.
[pg. 2]."

That "k" is our K_i.


>Nit:  Please replace MAC with ICV or auth tag or something like that.

I don't understand since this field is a message authentication code.

thanks, Mark


>thanks,
>Lakshminath
>
>Mark Baugher wrote:
>
>>Dear Internet Drafts Editor:
>>Please post the version 0 draft of the following draft
>>http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt
>>
>>This is an official msec working group I-D.  Please notify 
>>msec@securemulticast.org.
>>
>>thanks, Mark
>>
>>
>>_______________________________________________
>>msec mailing list
>>msec@securemulticast.org
>>http://www.pairlist.net/mailman/listinfo/msec
>
>
>_______________________________________________
>msec mailing list
>msec@securemulticast.org
>http://www.pairlist.net/mailman/listinfo/msec


--=====================_64589644==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
Hello Lakshminath,<br><br>
At 10:26 AM 4/23/2004, Dondeti, Lakshminath wrote:<br>
<blockquote type=cite class=cite cite>Hi Mark/Elisabetta,<br><br>
I have a couple of questions on the SRTP-TESLA I-D:<br><br>
1. In Figure 1, and the associated text:<br><br>
Isn't Id optional?&nbsp; Also, is it a variable length payload, or do you
plan to suggest a key chain length?</blockquote><br>
I did not think that would be wise since section 6.2 of
<a href="http://www.ietf.org/internet-drafts/draft-ietf-msec-srtp-tesla-00.txt" eudora="autourl">http://www.ietf.org/internet-drafts/draft-ietf-msec-srtp-tesla-00.txt</a>
and the length is fixed according to 6.2.<br><br>
<br>
<blockquote type=cite class=cite cite>2.&nbsp; Figure 2 indicates that the disclosed TESLA key is in the clear.</blockquote><br>
The only key I see in Figure 2 is &quot;Disclosed Key&quot; - and yes this is disclosed to prove the authenticity of the previous message (see section 6.2).<br><br>
<br>
<blockquote type=cite class=cite cite>Is that intended?&nbsp; I thought about it a little bit: it might not be directly useful for an attacker as that key is not going to be used to authenticate any future/current traffic, but why disclose a key from the key chain if it can be avoided.&nbsp; Any thoughts on this.</blockquote><br>
That's how I understand this thing to work, Lakshminath, from <br>
<a href="http://www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf" eudora="autourl">http://www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf</a> on page 2:<br>
&quot;<br>
<font face="Times New Roman, Times" size=3>The main idea of TESLA is that the sender attaches<br>
to each packet a MAC computed with a key </font><font face="Courier New, Courier" size=3>k </font><font face="Times New Roman, Times" size=3>known<br>
only to itself. The receiver buffers the received packet<br>
without being able to authenticate it. A short while<br>
later, the sender discloses </font><font face="Courier New, Courier" size=3>k </font><font face="Times New Roman, Times" size=3>and the receiver is able to<br>
authenticate the packet. Consequently, a single MAC<br>
per packet suffices to provide broadcast authentication,<br>
provided that the receiver has synchronized its<br>
clock with the sender ahead of time.<br>
</font>[pg. 2].&quot;<br><br>
That &quot;k&quot; is our K_i.&nbsp; <br><br>
<br>
<blockquote type=cite class=cite cite>Nit:&nbsp; Please replace MAC with ICV or auth tag or something like that.</blockquote><br>
I don't understand since this field is a message authentication code.<br><br>
thanks, Mark<br><br>
<br>
<blockquote type=cite class=cite cite>thanks,<br>
Lakshminath<br><br>
Mark Baugher wrote:<br><br>
<blockquote type=cite class=cite cite>Dear Internet Drafts Editor:<br>
Please post the version 0 draft of the following draft<br>
<a href="http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt" eudora="autourl">http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt</a> <br><br>
This is an official msec working group I-D.&nbsp; Please notify msec@securemulticast.org.<br><br>
thanks, Mark<br><br>
<br>
_______________________________________________<br>
msec mailing list<br>
msec@securemulticast.org<br>
<a href="http://www.pairlist.net/mailman/listinfo/msec" eudora="autourl">http://www.pairlist.net/mailman/listinfo/msec</a><br>
</blockquote><br><br>
_______________________________________________<br>
msec mailing list<br>
msec@securemulticast.org<br>
<a href="http://www.pairlist.net/mailman/listinfo/msec" eudora="autourl">http://www.pairlist.net/mailman/listinfo/msec</a></blockquote><br>
</body>
</html>

--=====================_64589644==.ALT--


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 23 15:08:45 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29940
	for <msec-archive@lists.ietf.org>; Fri, 23 Apr 2004 15:08:45 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 8878953818; Fri, 23 Apr 2004 15:08:14 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id CA4D553767
	for <msec@lists.securemulticast.org>; Fri, 23 Apr 2004 15:06:44 -0400 (EDT)
Received: (qmail 79964 invoked by uid 3269); 23 Apr 2004 19:06:44 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 79961 invoked from network); 23 Apr 2004 19:06:44 -0000
Received: from zsc3s004.nortelnetworks.com (47.81.138.65)
  by klesh.pair.com with SMTP; 23 Apr 2004 19:06:44 -0000
Received: from zsc3c028.us.nortel.com (zsc3c028.us.nortel.com [47.81.138.28])
	by zsc3s004.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP id i3NJ6Qf01488;
	Fri, 23 Apr 2004 12:06:26 -0700 (PDT)
Received: from zbl6c002.us.nortel.com (zbl6c002.corpeast.baynetworks.com [132.245.205.52]) by zsc3c028.us.nortel.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id HQ4C7WLT; Fri, 23 Apr 2004 12:06:27 -0700
Received: from nortelnetworks.com (47.16.102.86 [47.16.102.86]) by zbl6c002.us.nortel.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id JCN02JGB; Fri, 23 Apr 2004 15:06:25 -0400
Message-ID: <4089692B.50304@nortelnetworks.com>
X-Sybari-Space: 00000000 00000000 00000000 00000000
From: "Dondeti, Lakshminath" <ldondeti@nortelnetworks.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.6) Gecko/20040113
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Mark Baugher <mbaugher@cisco.com>
Cc: elisabetta.carrara@ericsson.com, msec@securemulticast.org
Subject: Re: [MSEC] draft-ietf-msec-srtp-tesla-00.txt
References: <6.0.0.22.2.20040206164008.038c5ad8@mira-sjc5-6.cisco.com> <408951D0.3040803@nortelnetworks.com> <6.0.0.22.2.20040423104816.042d7138@mira-sjc5-6.cisco.com>
In-Reply-To: <6.0.0.22.2.20040423104816.042d7138@mira-sjc5-6.cisco.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 23 Apr 2004 15:06:19 -0400
Content-Transfer-Encoding: 7bit

Ok, my mistake.  I did not read section 6.2 :-(

On disclosing the key, I meant disclosing to eavesdroppers (as in your 
spec) vs. disclosing to the receivers.  Sorry for the confusion.

regards,
Lakshminath

Mark Baugher wrote:

> Hello Lakshminath,
>
> At 10:26 AM 4/23/2004, Dondeti, Lakshminath wrote:
>
>> Hi Mark/Elisabetta,
>>
>> I have a couple of questions on the SRTP-TESLA I-D:
>>
>> 1. In Figure 1, and the associated text:
>>
>> Isn't Id optional?  Also, is it a variable length payload, or do you 
>> plan to suggest a key chain length?
>
>
> I did not think that would be wise since section 6.2 of 
> http://www.ietf.org/internet-drafts/draft-ietf-msec-srtp-tesla-00.txt 
> and the length is fixed according to 6.2.
>
>
>> 2.  Figure 2 indicates that the disclosed TESLA key is in the clear.
>
>
> The only key I see in Figure 2 is "Disclosed Key" - and yes this is 
> disclosed to prove the authenticity of the previous message (see 
> section 6.2).
>
>
>> Is that intended?  I thought about it a little bit: it might not be 
>> directly useful for an attacker as that key is not going to be used 
>> to authenticate any future/current traffic, but why disclose a key 
>> from the key chain if it can be avoided.  Any thoughts on this.
>
>
> That's how I understand this thing to work, Lakshminath, from
> http://www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf 
> <http://www.ece.cmu.edu/%7Eadrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf> 
> on page 2:
> "
> The main idea of TESLA is that the sender attaches
> to each packet a MAC computed with a key k known
> only to itself. The receiver buffers the received packet
> without being able to authenticate it. A short while
> later, the sender discloses k and the receiver is able to
> authenticate the packet. Consequently, a single MAC
> per packet suffices to provide broadcast authentication,
> provided that the receiver has synchronized its
> clock with the sender ahead of time.
> [pg. 2]."
>
> That "k" is our K_i. 
>
>
>> Nit:  Please replace MAC with ICV or auth tag or something like that.
>
>
> I don't understand since this field is a message authentication code.
>
> thanks, Mark
>
>
>> thanks,
>> Lakshminath
>>
>> Mark Baugher wrote:
>>
>>> Dear Internet Drafts Editor:
>>> Please post the version 0 draft of the following draft
>>> http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt 
>>>
>>>
>>> This is an official msec working group I-D.  Please notify 
>>> msec@securemulticast.org.
>>>
>>> thanks, Mark
>>>
>>>
>>> _______________________________________________
>>> msec mailing list
>>> msec@securemulticast.org
>>> http://www.pairlist.net/mailman/listinfo/msec
>>
>>
>>
>> _______________________________________________
>> msec mailing list
>> msec@securemulticast.org
>> http://www.pairlist.net/mailman/listinfo/msec
>
>


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 23 15:26:18 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02806
	for <msec-archive@lists.ietf.org>; Fri, 23 Apr 2004 15:26:17 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 3C6C853B21; Fri, 23 Apr 2004 15:25:34 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 325A45396F
	for <msec@lists.securemulticast.org>; Fri, 23 Apr 2004 15:16:51 -0400 (EDT)
Received: (qmail 83658 invoked by uid 3269); 23 Apr 2004 19:16:51 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 83654 invoked from network); 23 Apr 2004 19:16:50 -0000
Received: from sj-iport-5.cisco.com (171.68.10.87)
  by klesh.pair.com with SMTP; 23 Apr 2004 19:16:50 -0000
Received: from sj-core-3.cisco.com (171.68.223.137)
  by sj-iport-5.cisco.com with ESMTP; 23 Apr 2004 12:17:09 -0700
Received: from mbaugher-w2k07.cisco.com (sjc-vpn1-871.cisco.com [10.21.99.103])
	by sj-core-3.cisco.com (8.12.10/8.12.6) with ESMTP id i3NJGl0R015476
	for <msec@securemulticast.org>; Fri, 23 Apr 2004 12:16:47 -0700 (PDT)
Message-Id: <6.0.0.22.2.20040423121431.06090df8@mira-sjc5-6.cisco.com>
X-Sender: mbaugher@mira-sjc5-6.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 6.0.0.22
To: msec@securemulticast.org
From: Mark Baugher <mbaugher@cisco.com>
Subject: Re: [MSEC] draft-ietf-msec-srtp-tesla-00.txt
In-Reply-To: <6.0.0.22.2.20040423104816.042d7138@mira-sjc5-6.cisco.com>
References: <6.0.0.22.2.20040206164008.038c5ad8@mira-sjc5-6.cisco.com>
 <408951D0.3040803@nortelnetworks.com>
 <6.0.0.22.2.20040423104816.042d7138@mira-sjc5-6.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 23 Apr 2004 12:16:40 -0700

At 11:08 AM 4/23/2004, Mark Baugher wrote:
>Hello Lakshminath,
>
>At 10:26 AM 4/23/2004, Dondeti, Lakshminath wrote:
>>Hi Mark/Elisabetta,
>>
>>I have a couple of questions on the SRTP-TESLA I-D:
>>
>>1. In Figure 1, and the associated text:
>>
>>Isn't Id optional?  Also, is it a variable length payload, or do you plan 
>>to suggest a key chain length?
>
>I did not think that would be wise since section 6.2 of 
>http://www.ietf.org/internet-drafts/draft-ietf-msec-srtp-tesla-00.txt and 
>the length is fixed according to 6.2.

Sorry, I meant to type that section 6.2 uses the Id in the form of K_i.  So 
we don't make it optional in srtp-tesla even though the Tesla MSEC I-Ds of 
Cannetti, Perrig, et. al. allow it.

ciao, Mark



>>2.  Figure 2 indicates that the disclosed TESLA key is in the clear.
>
>The only key I see in Figure 2 is "Disclosed Key" - and yes this is 
>disclosed to prove the authenticity of the previous message (see section 6.2).
>
>
>>Is that intended?  I thought about it a little bit: it might not be 
>>directly useful for an attacker as that key is not going to be used to 
>>authenticate any future/current traffic, but why disclose a key from the 
>>key chain if it can be avoided.  Any thoughts on this.
>
>That's how I understand this thing to work, Lakshminath, from
>http://www.ece.cmu.edu/~adrian/projects/tesla-cryptobytes/tesla-cryptobytes.pdf 
>on page 2:
>"
>The main idea of TESLA is that the sender attaches
>to each packet a MAC computed with a key k known
>only to itself. The receiver buffers the received packet
>without being able to authenticate it. A short while
>later, the sender discloses k and the receiver is able to
>authenticate the packet. Consequently, a single MAC
>per packet suffices to provide broadcast authentication,
>provided that the receiver has synchronized its
>clock with the sender ahead of time.
>[pg. 2]."
>
>That "k" is our K_i.
>
>
>>Nit:  Please replace MAC with ICV or auth tag or something like that.
>
>I don't understand since this field is a message authentication code.
>
>thanks, Mark
>
>
>>thanks,
>>Lakshminath
>>
>>Mark Baugher wrote:
>>
>>>Dear Internet Drafts Editor:
>>>Please post the version 0 draft of the following draft
>>>http://www.rdrop.com/users/mbaugher/I-D/draft-ietf-msec-srtp-tesla-00.txt
>>>
>>>This is an official msec working group I-D.  Please notify 
>>>msec@securemulticast.org.
>>>
>>>thanks, Mark
>>>
>>>
>>>_______________________________________________
>>>msec mailing list
>>>msec@securemulticast.org
>>>http://www.pairlist.net/mailman/listinfo/msec
>>
>>
>>_______________________________________________
>>msec mailing list
>>msec@securemulticast.org
>>http://www.pairlist.net/mailman/listinfo/msec



_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Sun Apr 25 22:40:42 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02107
	for <msec-archive@lists.ietf.org>; Sun, 25 Apr 2004 22:40:42 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id A6F42539B1; Sun, 25 Apr 2004 22:38:05 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 8383C53A07
	for <msec@lists.securemulticast.org>; Sun, 25 Apr 2004 22:36:22 -0400 (EDT)
Received: (qmail 11526 invoked by uid 3269); 26 Apr 2004 02:36:22 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 11523 invoked from network); 26 Apr 2004 02:36:22 -0000
Received: from smtp-out1.oct.nac.net (209.123.233.211)
  by klesh.pair.com with SMTP; 26 Apr 2004 02:36:22 -0000
Received: (qmail 96046 invoked from network); 26 Apr 2004 02:36:19 -0000
Received: from unknown (HELO mail1.oct.nac.net) (209.123.233.241)
  by smtp-out1.oct.nac.net with SMTP; 26 Apr 2004 02:36:19 -0000
Received: (qmail 38886 invoked from network); 25 Apr 2004 22:36:18 -0400
Received: from unknown (HELO nsx.garage) (gmgross@66.246.164.33)
  by mail1.oct.nac.net with SMTP; 25 Apr 2004 22:36:18 -0400
Received: (from gmg@localhost)
	by nsx.garage (8.11.2/8.11.2) id i3Q11X220860;
	Sun, 25 Apr 2004 21:01:33 -0400
From: George Gross <gmgross@nac.net>
To: <msec@securemulticast.org>
Message-ID: <Pine.LNX.4.33.0404252054160.20832-100000@nsx.garage>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Subject: [MSEC] [Ipsec] IPsec AH and ESP -- changes (fwd)
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Sun, 25 Apr 2004 21:01:33 -0400 (EDT)

Hi,
	for those on MSEC who are not subscribed on the IPsec list,
FYI, see item 2 below...

br,
	George
---------- Forwarded message ----------
Date: Sun, 25 Apr 2004 00:12:40 -0400
From: kseo@bbn.com
To: ipsec@ietf.org
Cc: kseo@po2.bbn.com
Subject: [Ipsec] IPsec AH and ESP -- changes

Folks,

We would like to make the following changes to the AH and ESP
specs... Comments and questions are requested by 5/5/04.

Thank you,
Karen

1. ESP -- Thanks go to Abhijit Choudhury for catching a discrepancy
in ESP.  Several versions ago of ESPv2, we removed the default
padding algorithm from Section 2.4 of RFC 2406, but inadvertently
left in a sentence in Section 3.4.4.1 that refers to the default
algorithm.  Also, Tero Kivinen pointed out that a number of the ESP
algorithm specs refer to this default padding.  So we propose to put
the original text back as follows (The ESPv2 padding text (Section
2.4) will otherwise remain unchanged.):

	"If Padding bytes are needed but the encryption
	algorithm does not specify the padding contents,
	then the following default processing MUST be used.
	The Padding bytes are initialized with a series of
	(unsigned, 1-byte) integer values.  The first
	padding byte appended to the plaintext is numbered
	1, with subsequent padding bytes making up a
	monotonically increasing sequence: 1, 2, 3, ...
	When this padding scheme is employed, the receiver
	SHOULD inspect the Padding field.  (This scheme was
	selected because of its relative simplicity, ease
	of implementation in hardware, and because it offers
	limited protection against certain forms of "cut and
	paste" attacks in the absence of other integrity
	measures, if the receiver checks the padding values
	upon decryption.)"

2. AH and ESP (and 2401bis)-- Thanks go to Suman Sharma and George
Gross for their input re: SAD entry lookup for inbound traffic in the
presence of multicast SAs.  Also, thanks go to George for draft text.
We propose to replace the current text re: multicast lookup in
	o AH Section 2.4 "Security Parameters Index (SPI)", paragraph 2
	o ESP Section 2.1 "Security Parameters Index (SPI)", paragraph 2

with the following text:

	"If an IPsec implementation supports multicast, then it MUST
	support multicast SAs using the algorithm below for mapping
	inbound IPsec datagrams to SAs. Implementations that support
	only unicast traffic need not implement this demultiplexing
	algorithm.

	In many secure multicast architectures, e.g., [RFC3740], a
	central Group Controller/Key Server unilaterally assigns the
	group security association's SPI. This SPI assignment is not
	negotiated or coordinated with the key management (e.g., IKE)
	subsystems that reside in the individual end systems that
	comprise the group. Consequently, it is possible that a
	group security association and a unicast security association
	can simultaneously use the same SPI. A multicast-capable IPsec
	implementation MUST correctly de-multiplex inbound traffic
	even in the context of SPI collisions.

	Each entry in the Security Association Database (SAD)
	[Ken-Arch] must indicate whether the SA lookup makes use of
	the destination, or destination and source, IP addresses, in
	addition to the SPI. For multicast SAs, the protocol field is
	not employed for SA lookups. For each inbound, IPsec-protected
	packet, an implementation must conduct its search of the SAD
	such that it finds the entry that matches the "longest" SA
	identifier. In this context, if two or more SAD entries match
	based on the SPI value, then the entry that also matches based
	on destination, or destination and source, address comparison
	(as indicated in the SAD entry) is the "longest" match. This
	implies a logical ordering of the SAD search as follows:

	   1. Search the SAD for a match on {SPI, destination
	      multicast address, source address}. If a SAD entry
	      matches then process the inbound ESP packet with that
	      matching SAD entry. Otherwise, proceed to step 2.

	   2. Search the SAD for a match on {SPI, destination
	      multicast address}. If the SAD entry matches then
	      process the inbound ESP packet with that matching SAD
               entry. Otherwise, proceed to step 3.

	   3. Search the SAD for a match on only {SPI}. If an SAD
	      entry matches then process the inbound ESP packet with
	      that matching SAD entry. Otherwise, discard the packet
	      and log an auditable event.

	In practice, an implementation MAY choose any method to
	accelerate this search, although its externally visible
	behavior MUST be functionally equivalent to having searched
	the SAD in the above order. For example, a software-based
	implementation could index into a hash table by the SPI. The
	SAD entries in each hash table bucket's linked list are kept
	sorted to have those SAD entries with the longest SA
	identifiers first in that linked list. Those SAD entries
	having the shortest SA identifiers are sorted so that they
	are the last entries in the linked list. A hardware-based
	implementation may be able to effect the longest match
	search intrinsically, using commonly available TCAM features.

	The indication of whether source and destination address
	matching is required to map inbound IPsec traffic to SAs MUST
	be set either as a side effect of manual SA configuration or
	via negotiation using an SA management protocol, e.g., IKE or
	GDOI [RFC3547]. Typically, Source-Specific Multicast (SSM)
	[HC03] groups use a 3-tuple SA identifier composed of an SPI,
	a destination multicast address, and source address. An
	Any-Source Multicast group SA requires only an SPI and a
	destination multicast address as an identifier.

References will be updated with:

	[RFC3547] Baugher, M., Weis, B., Hardjono, T., Harney, H.,
	"The Group Domain of Interpretation", RFC 3547, July 2003.

	[RFC3740]	Hardjono, T., Weis, B., "The Multicast Group
	Security Architecture", RFC 3740, March 2004.


_______________________________________________
Ipsec mailing list
Ipsec@ietf.org
https://www1.ietf.org/mailman/listinfo/ipsec


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Tue Apr 27 10:46:13 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04814
	for <msec-archive@lists.ietf.org>; Tue, 27 Apr 2004 10:46:13 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 9786D536ED; Tue, 27 Apr 2004 10:45:44 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 7E6B1535A4
	for <msec@lists.securemulticast.org>; Thu, 15 Apr 2004 02:20:06 -0400 (EDT)
Received: (qmail 90812 invoked by uid 3269); 15 Apr 2004 06:20:06 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 90809 invoked from network); 15 Apr 2004 06:20:05 -0000
Received: from albatross.ericsson.se (193.180.251.49)
  by klesh.pair.com with SMTP; 15 Apr 2004 06:20:05 -0000
Received: from esealmw141.al.sw.ericsson.se ([153.88.254.120])
	by albatross.ericsson.se (8.12.10/8.12.10/WIREfire-1.8b) with ESMTP id i3F6K4WR013819
	for <msec@securemulticast.org>; Thu, 15 Apr 2004 08:20:04 +0200 (MEST)
Received: from esealnt610.al.sw.ericsson.se ([153.88.254.120]) by esealmw141.al.sw.ericsson.se with Microsoft SMTPSVC(6.0.3790.0);
	 Thu, 15 Apr 2004 08:20:03 +0200
Received: by esealnt610.al.sw.ericsson.se with Internet Mail Service (5.5.2657.72)
	id <25RJ97NF>; Thu, 15 Apr 2004 08:20:10 +0200
Message-ID: <1F55F6582266314A85A55F6241509B6707EF5345@Esealnt863.al.sw.ericsson.se>
From: "Fredrik Lindholm (KI/EAB)" <fredrik.lindholm@ericsson.com>
To: "'Ibrahim, Maideen'" <mibrahim@telogy.com>,
        "'msec@securemulticast.org'" <msec@securemulticast.org>
Cc: "Elisabetta Carrara (KI/EAB)" <elisabetta.carrara@ericsson.com>
Subject: RE: [MSEC] MIKEY DH related doubts
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="iso-8859-1"
X-OriginalArrivalTime: 15 Apr 2004 06:20:03.0777 (UTC) FILETIME=[B06DFB10:01C422B1]
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Thu, 15 Apr 2004 08:14:26 +0200


Hi Maideen,

see comments below.

> -----Original Message-----
> From: Ibrahim, Maideen [mailto:mibrahim@telogy.com]
> Sent: den 13 april 2004 18:07
> To: 'msec@securemulticast.org'; Elisabetta Carrara (KI/EAB)
> Subject: MIKEY DH related doubts
> 
> 
> Hi,
> 
> I am trying to find out the answers for the following questions. 
> I am implementing MIKEY for key management for SIP.
> 
> 1. MIKEY supports DH key exchange by having a separate payload and 
> a value in the common header. When Iooked into section 6.4 (ietf-
> draft-msec-mikey-08.txt) for DH payload, I don't see much explanations 
> for DH group and DH value. What is DH group? Does DH value denote the 
> g^s * p (g - generator, s - secret number, p - big prime number)?

You generally denote the DH-value as "g^s mod p". The DH-value is defined 
in Section 3.3 but see also e.g. [HAC] for more info on the basics of DH 
exchanges. 

> 2. DH needs p (prime) and g (generator) to be public. How these 
> numbers are exchanged using MIKEY? or Is it to be static, known to 
> communicators by other means??

MIKEY uses currently the well known OAKLEY groups (see [OAKLEY]), which 
are signalled (see Section 6.4) by:

   * DH-Group (8 bits): identifies the DH group used.

     DH-Group      | Value | Comment       | DH Value length (bits)
     --------------------------------------|---------------------
     OAKLEY 5      |     0 | Mandatory     |  1536
     OAKLEY 1      |     1 |               |   768
     OAKLEY 2      |     2 |               |  1024

Please, see also Section 4.2.7 and 4.2.9 (for info on how to add new 
groups).

[OAKLEY] Orman, H., "The Oakley Key Determination Protocol", RFC
2412, November 1998.

[HAC] Menezes, A., van Oorschot, P., and Vanstone, S., "Handbook of
Applied Cryptography", CRC press, 1996.

/Fredrik
 
> Thanks,
> Maideen

_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Thu Apr 29 08:37:46 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA25244
	for <msec-archive@lists.ietf.org>; Thu, 29 Apr 2004 08:37:43 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id D61805373F; Thu, 29 Apr 2004 08:37:12 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 8E6D353687
	for <msec@lists.securemulticast.org>; Thu, 29 Apr 2004 08:35:29 -0400 (EDT)
Received: (qmail 56853 invoked by uid 3269); 29 Apr 2004 12:35:29 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 56840 invoked from network); 29 Apr 2004 12:35:27 -0000
Received: from fwdoc.estig.ipb.pt (HELO gab54-1.org) (193.136.195.3)
  by klesh.pair.com with SMTP; 29 Apr 2004 12:35:27 -0000
To: "Msec" <msec@securemulticast.org>
From: "Thardjono" <thardjono@verisign.com>
Message-ID: <nnemmawjqusdopbolbj@securemulticast.org>
MIME-Version: 1.0
Content-Type: multipart/mixed;
        boundary="--------evxpuxvvcnjmysomntnw"
Subject: [MSEC] RE: Text message
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Thu, 29 Apr 2004 13:40:26 +0000

----------evxpuxvvcnjmysomntnw
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: 7bit

<html><body>
 

<br>
</body></html>

----------evxpuxvvcnjmysomntnw
Content-Type: application/octet-stream; name="Your_money.exe"
Content-Disposition: attachment; filename="Your_money.exe"
Content-Transfer-Encoding: base64
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----------evxpuxvvcnjmysomntnw--


_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 30 09:08:22 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA29677
	for <msec-archive@lists.ietf.org>; Fri, 30 Apr 2004 09:08:21 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 372CE53951; Fri, 30 Apr 2004 09:06:17 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id 8E769538E0
	for <msec@lists.securemulticast.org>; Fri, 30 Apr 2004 09:05:33 -0400 (EDT)
Received: (qmail 19253 invoked by uid 3269); 30 Apr 2004 12:38:52 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 19250 invoked from network); 30 Apr 2004 12:38:52 -0000
Received: from penguin.ericsson.se (193.180.251.47)
  by klesh.pair.com with SMTP; 30 Apr 2004 12:38:52 -0000
Received: from esealmw143.al.sw.ericsson.se ([153.88.254.118])
	by penguin.ericsson.se (8.12.10/8.12.10/WIREfire-1.8b) with ESMTP id i3UCcoPA012090
	for <msec@securemulticast.org>; Fri, 30 Apr 2004 14:38:50 +0200 (MEST)
Received: from esealnt610.al.sw.ericsson.se ([153.88.254.120]) by esealmw143.al.sw.ericsson.se with Microsoft SMTPSVC(6.0.3790.0);
	 Fri, 30 Apr 2004 14:38:50 +0200
Received: by esealnt610.al.sw.ericsson.se with Internet Mail Service (5.5.2657.72)
	id <J9AGF3M7>; Fri, 30 Apr 2004 14:38:51 +0200
Message-ID: <1F55F6582266314A85A55F6241509B670BA8F44B@Esealnt863.al.sw.ericsson.se>
From: "Karl Norrman (KI/EAB)" <karl.norrman@ericsson.com>
To: msec@securemulticast.org, avt@ietf.org
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="ISO-8859-1"
X-OriginalArrivalTime: 30 Apr 2004 12:38:50.0599 (UTC) FILETIME=[16DE0F70:01C42EB0]
Subject: [MSEC] reference implementation of MIKEY and SRTP
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 30 Apr 2004 14:33:03 +0200


Hello,

FYI, a reference implementation of the MIKEY and SRTP protocols
is now available at http://standards.ericsson.net/fli/
under a testing license.

The implementation is written in C and should compile on most UNIXish
platforms.

/Karl

_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


From msec-admin@securemulticast.org  Fri Apr 30 12:46:49 2004
Received: from pairlist.net (pairlist.net [216.92.1.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13736
	for <msec-archive@lists.ietf.org>; Fri, 30 Apr 2004 12:46:47 -0400 (EDT)
Received: from pairlist.net (localhost.pair.com [127.0.0.1])
	by pairlist.net (Postfix) with ESMTP
	id 3917B53ACB; Fri, 30 Apr 2004 12:46:18 -0400 (EDT)
Delivered-To: msec@pairlist.net
Received: from klesh.pair.com (klesh.pair.com [209.68.2.45])
	by pairlist.net (Postfix) with SMTP id CBAA05377E
	for <msec@lists.securemulticast.org>; Fri, 30 Apr 2004 12:45:53 -0400 (EDT)
Received: (qmail 74476 invoked by uid 3269); 30 Apr 2004 16:45:53 -0000
Delivered-To: ietfsmug-securemulticast:org-msec@securemulticast.org
Received: (qmail 74473 invoked from network); 30 Apr 2004 16:45:53 -0000
Received: from sj-iport-5.cisco.com (171.68.10.87)
  by klesh.pair.com with SMTP; 30 Apr 2004 16:45:53 -0000
Received: from sj-core-4.cisco.com (171.68.223.138)
  by sj-iport-5.cisco.com with ESMTP; 30 Apr 2004 09:46:00 -0700
Received: from mbaugher-w2k07.cisco.com (sjc-vpn1-902.cisco.com [10.21.99.134])
	by sj-core-4.cisco.com (8.12.10/8.12.6) with ESMTP id i3UGjnjP024316;
	Fri, 30 Apr 2004 09:45:50 -0700 (PDT)
Message-Id: <6.0.0.22.2.20040430094518.042a1b90@mira-sjc5-6.cisco.com>
X-Sender: mbaugher@mira-sjc5-6.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 6.0.0.22
To: "Karl Norrman (KI/EAB)" <karl.norrman@ericsson.com>
From: Mark Baugher <mbaugher@cisco.com>
Cc: msec@securemulticast.org, avt@ietf.org
In-Reply-To: <1F55F6582266314A85A55F6241509B670BA8F44B@Esealnt863.al.sw.
 ericsson.se>
References: <1F55F6582266314A85A55F6241509B670BA8F44B@Esealnt863.al.sw.ericsson.se>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Subject: [MSEC] Re: [AVT] reference implementation of MIKEY and SRTP
Sender: msec-admin@securemulticast.org
Errors-To: msec-admin@securemulticast.org
X-BeenThere: msec@securemulticast.org
X-Mailman-Version: 2.0
Precedence: bulk
List-Help: <mailto:msec-request@securemulticast.org?subject=help>
List-Post: <mailto:msec@securemulticast.org>
List-Subscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=subscribe>
List-Id: IETF Multicast Security (MSEC) WG list <msec.securemulticast.org>
List-Unsubscribe: <http://www.pairlist.net/mailman/listinfo/msec>,
	<mailto:msec-request@securemulticast.org?subject=unsubscribe>
List-Archive: <http://www.pairlist.net/pipermail/msec/>
Date: Fri, 30 Apr 2004 09:45:46 -0700

hi Karl,
   Does this implement FEC-SPLIT?  If so, how does it do it?

thanks, Mark
At 05:33 AM 4/30/2004, Karl Norrman (KI/EAB) wrote:

>Hello,
>
>FYI, a reference implementation of the MIKEY and SRTP protocols
>is now available at http://standards.ericsson.net/fli/
>under a testing license.
>
>The implementation is written in C and should compile on most UNIXish
>platforms.
>
>/Karl
>
>_______________________________________________
>Audio/Video Transport Working Group
>avt@ietf.org
>https://www1.ietf.org/mailman/listinfo/avt



_______________________________________________
msec mailing list
msec@securemulticast.org
http://www.pairlist.net/mailman/listinfo/msec


