From muru_lak2001@yahoo.com  Tue Mar  1 05:19:03 2005
From: muru_lak2001@yahoo.com (Murugaraj)
Date: Tue Mar  1 05:19:03 2005
Subject: [Hipsec] Draft: ESP usage in HIP??
In-Reply-To: <42020300.5040302@nomadiclab.com>
Message-ID: <20050301101842.75932.qmail@web14306.mail.yahoo.com>

--0-119296128-1109672321=:75418
Content-Type: text/plain; charset=us-ascii

Hi ,
 
  I am really confused about the splitting of ESP usage from the base draft. 
 
Does it mean that the HIP hosts "optionally" carry ESP stuff 
           or 
 is it just to address seperately for simplictiy?
 
I feel that the HIP still suggests the "mandatory" usage of ESP for the data traffic. am i right? Because in the HIP-base-02 dratft, it is quoted that HIP must implement the ESP transport format.
 
ciao,
Raj.


		
---------------------------------
Do you Yahoo!?
 Yahoo! Mail - 250MB free storage. Do more. Manage less.
--0-119296128-1109672321=:75418
Content-Type: text/html; charset=us-ascii

<DIV>
<BLOCKQUOTE class=replbq style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px solid">
<DIV>Hi ,</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp; I am really confused about the splitting of ESP usage from the base draft. </DIV>
<DIV>&nbsp;</DIV>
<DIV>Does it mean that the HIP hosts "optionally" carry ESP stuff </DIV>
<DIV>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or </DIV>
<DIV>&nbsp;is it&nbsp;just to address seperately for simplictiy?</DIV>
<DIV>&nbsp;</DIV>
<DIV>I feel that the HIP still suggests the "mandatory" usage of ESP for the data traffic. am i right? Because in the HIP-base-02 dratft, it is quoted that HIP must implement the ESP transport format.</DIV>
<DIV>&nbsp;</DIV>
<DIV>ciao,</DIV>
<DIV>Raj.</DIV></BLOCKQUOTE></DIV><p>
		<hr size=1>Do you Yahoo!?<br> 
Yahoo! Mail - 250MB free storage. <a href="http://us.rd.yahoo.com/evt=29915/*http://info.mail.yahoo.com/mail_250">Do more. Manage less.</a>
--0-119296128-1109672321=:75418--

From Gonzalo.Camarillo@ericsson.com  Tue Mar  1 08:21:01 2005
From: Gonzalo.Camarillo@ericsson.com (Gonzalo Camarillo)
Date: Tue Mar  1 08:21:01 2005
Subject: [Hipsec] Agenda IETF 62
In-Reply-To: <6938661A6EDA8A4EA8D1419BCE46F24C06648F5F@xch-nw-27.nw.nos.boeing.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C06648F5F@xch-nw-27.nw.nos.boeing.com>
Message-ID: <42246C25.6010501@ericsson.com>

Done.

Gonzalo

Henderson, Thomas R wrote:
> Gonzalo,
> i) it would seem to make sense to keep the discussion on HIP-MM draft
> together-- suggest moving my presentation on hip-mm to just before
> Christian's slot
> 
> ii) likewise, the draft on generalizing HIP pertains to the base spec
> and could be moved up to the third slot.
> 
> Tom 
> 
> 
>>-----Original Message-----
>>From: Gonzalo Camarillo [mailto:Gonzalo.Camarillo@ericsson.com] 
>>Sent: Monday, February 28, 2005 6:18 AM
>>To: HIP
>>Cc: David Ward
>>Subject: [Hipsec] Agenda IETF 62
>>
>>Folks,
>>
>>this is the preliminary agenda for the Minneapolis meeting:
>>
>>http://hip.piuha.net/meetings/ietf62/agenda.html
>>
>>Note that every speaker has gotten more time than he requested.
>>
>>Regards,
>>
>>Gonzalo

From thomas.r.henderson@boeing.com  Wed Mar  2 12:28:01 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Wed Mar  2 12:28:01 2005
Subject: [Hipsec] Draft: ESP usage in HIP??
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C04060A73@xch-nw-27.nw.nos.boeing.com>

Raj,
You can find the discussion of this at the following mailing list
thread:
http://honor.trusecure.com/pipermail/hipsec/2004-November/001132.html
=20
You are correct that ESP for HIP is mandatory, although I have a recent
draft suggesting that it should be not a "MUST".
http://www.ietf.org/internet-drafts/draft-henderson-hip-generalize-00.tx
t
=20
Tom


________________________________

	From: Murugaraj [mailto:muru_lak2001@yahoo.com]=20
	Sent: Tuesday, March 01, 2005 2:19 AM
	To: Petri Jokela; hipsec@honor.trusecure.com
	Subject: [Hipsec] Draft: ESP usage in HIP??
=09
=09

		Hi ,
		=20
		  I am really confused about the splitting of ESP usage
from the base draft.=20
		=20
		Does it mean that the HIP hosts "optionally" carry ESP
stuff=20
		           or=20
		 is it just to address seperately for simplictiy?
		=20
		I feel that the HIP still suggests the "mandatory" usage
of ESP for the data traffic. am i right? Because in the HIP-base-02
dratft, it is quoted that HIP must implement the ESP transport format.
		=20
		ciao,
		Raj.

	________________________________

	Do you Yahoo!?
	Yahoo! Mail - 250MB free storage. Do more. Manage less.
<http://us.rd.yahoo.com/evt=3D29915/*http://info.mail.yahoo.com/mail_250>=
=20



From pekka.nikander@nomadiclab.com  Sat Mar  5 22:15:00 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Sat Mar  5 22:15:00 2005
Subject: [Hipsec] FW: I-D ACTION:draft-henderson-hip-generalize-00.txt
In-Reply-To: <6938661A6EDA8A4EA8D1419BCE46F24C06648EE6@xch-nw-27.nw.nos.boeing.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C06648EE6@xch-nw-27.nw.nos.boeing.com>
Message-ID: <f48b8757bc3e17c3c0b7fcddd1a0313e@nomadiclab.com>

[Limiting the discussion to the WG ML.]

I like the general direction and ideas of this draft a lot.

The only bigger thing that I am concerned about is allowing HITs/ULIDs 
of any length.  My feeling is that such a change would be detrimental, 
and create potential problems in the early packet handling code.  For 
example, the code needed for finding the right existing context would 
probably become much more complex.  Additionally, the code needed to 
determine if the Responder HIT/ULID in an I1 is one that belongs to the 
host may also become rather hairy.

Therefore I would suggest that if we want to allow HITs/ULIDs of 
different lengths, we would limit those lengths only to a few choices, 
like 128 bits or 256 bits.  Alternatively, I'm willing to consider a 
situation where the HIT/ULID type field implicitly defines the length.  
That's probably fine for end hosts; if you don't know an ULID type, you 
just reply with an appropriate ICMP. However, that seems bad for middle 
boxes; they would have more problems in deciding what to do with 
packets that carry ULIDs whose lengths they do not know.

I've send some editorial and other minor notes separately.

--Pekka


From pekka.nikander@nomadiclab.com  Sun Mar  6 16:41:00 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Sun Mar  6 16:41:00 2005
Subject: [Hipsec] Looking for a volunteer to run the hipsec ML
Message-ID: <52fae3df6c284f5e7a468ab11a95e5d0@nomadiclab.com>

I have been running the hipsec ML for quite long now,
meaning that I've been doing spam filtering pretty
much manually.  With new responsibilities and increased
amount of spam I can't do it any more.  Hence, I am looking
for someone to help either to set up automatic spam filtering
for the list or to take over the ML management.  (Manual
management requires maybe 2 hours per week, but I don't have
that right now.)

Anyone?

--Pekka


From pekka.nikander@nomadiclab.com  Tue Mar  8 15:38:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Tue Mar  8 15:38:01 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <073b01c51928$36411bb0$ef01a996@gmp>
References: <E1D1Npf-00011F-00@alva.home> <42133673.5040907@piuha.net> <073b01c51928$36411bb0$ef01a996@gmp>
Message-ID: <7274ca59e1cbadd7fdc4905ada0c14d0@nomadiclab.com>

> The HIT needs two properties:
>
> 1) probably unique
> 2) a identifier for the HI
>
> SHA1 will still supply property 1).
>
> As for property 2), I thought HIP was using a non-keyed SHA1 hash for
> HI=>HIT computation?  Basically, HIP is using SHA1's "randomness" 
> property
> to meet property 1), yes?  In this case, there is nothing to break and
> property 2) holds as well.  As for using keyed SHA1 for say, signing a
> packet or whatnot, then yes, looks like SHA256 will have to be used 
> soon.

Well, there is more in this.  The HIT essentially works as a
channel binding, giving assurance to the application that when
it does connect(HIT) it actually gets a (secured) connection to
the identified host.  From that point of view, if SHA-1 has a
weakness so that it becomes feasible to generate another (perhaps
very short) public key that hashes to the same HIT, we do have a
problem.  My crypto understanding is too weak to be able to say
for sure, but my understanding is that it has became easier to
do that.

I'm putting this up on the base spec slides for tomorrow.  My
personal opinion is to move to HMAC and SHA-256.  I don't know
if we want to change the HIT length in the HIP header at the
same time or not.  Maybe, just for the sake.  We could then use
the uppermost 128 bits of the HIT at the API, with the current
01/10 restriction.  The LSI would then probably use 24 top most
bits from the HIT instead of the 24 low bits, as now, but we are
moving LSIs away from the base spec probably anyway.

--Pekka


From yogesh.swami@nokia.com  Tue Mar  8 16:08:01 2005
From: yogesh.swami@nokia.com (Yogesh Prem Swami)
Date: Tue Mar  8 16:08:01 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <7274ca59e1cbadd7fdc4905ada0c14d0@nomadiclab.com>
References: <E1D1Npf-00011F-00@alva.home> <42133673.5040907@piuha.net>
 <073b01c51928$36411bb0$ef01a996@gmp>
 <7274ca59e1cbadd7fdc4905ada0c14d0@nomadiclab.com>
Message-ID: <1110316095.15384.36.camel@atcp01.americas.nokia.com>

[Getting back on this mailing list after a long time :-) ]

As far as SHA1 is concerned, I guess HITs (and HIP KE) are still quite
secure. The reason is that HITs are generated from the public keys, so
an attacker can potentially generate a string that will result in the
same HITs, however for the attacker to be able to make use of this
string she must must also be able to generate the private keys
corresponding to that string. This is non trivial under standard crypto
assumptions. For example, let say, I have [Priv, Pub] as my private and
public keys, and an attacker generate Pub2 string such SHA1(Pub) ==
SHA1(Pub2). For the attacker to be able to use Pub2 during key exchange,
she must sign her messages with the private key corresponding to Pub2.
This is clearly not possible.

Hash Collisions get so much attention because it makes certificates
untrustworthy. HIP, on the other hand is quite secure in spite of the
collisions.

Thanks
Yogesh  

On Tue, 2005-03-08 at 14:37, ext Pekka Nikander wrote:
> > The HIT needs two properties:
> >
> > 1) probably unique
> > 2) a identifier for the HI
> >
> > SHA1 will still supply property 1).
> >
> > As for property 2), I thought HIP was using a non-keyed SHA1 hash for
> > HI=>HIT computation?  Basically, HIP is using SHA1's "randomness" 
> > property
> > to meet property 1), yes?  In this case, there is nothing to break and
> > property 2) holds as well.  As for using keyed SHA1 for say, signing a
> > packet or whatnot, then yes, looks like SHA256 will have to be used 
> > soon.
> 
> Well, there is more in this.  The HIT essentially works as a
> channel binding, giving assurance to the application that when
> it does connect(HIT) it actually gets a (secured) connection to
> the identified host.  From that point of view, if SHA-1 has a
> weakness so that it becomes feasible to generate another (perhaps
> very short) public key that hashes to the same HIT, we do have a
> problem.  My crypto understanding is too weak to be able to say
> for sure, but my understanding is that it has became easier to
> do that.
> 
> I'm putting this up on the base spec slides for tomorrow.  My
> personal opinion is to move to HMAC and SHA-256.  I don't know
> if we want to change the HIT length in the HIP header at the
> same time or not.  Maybe, just for the sake.  We could then use
> the uppermost 128 bits of the HIT at the API, with the current
> 01/10 restriction.  The LSI would then probably use 24 top most
> bits from the HIT instead of the 24 low bits, as now, but we are
> moving LSIs away from the base spec probably anyway.
> 
> --Pekka
> 
> _______________________________________________
> Hipsec mailing list
> Hipsec@honor.trusecure.com
> http://honor.trusecure.com/mailman/listinfo/hipsec


From pekka.nikander@nomadiclab.com  Tue Mar  8 17:01:03 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Tue Mar  8 17:01:03 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <1110316095.15384.36.camel@atcp01.americas.nokia.com>
References: <E1D1Npf-00011F-00@alva.home> <42133673.5040907@piuha.net> <073b01c51928$36411bb0$ef01a996@gmp> <7274ca59e1cbadd7fdc4905ada0c14d0@nomadiclab.com> <1110316095.15384.36.camel@atcp01.americas.nokia.com>
Message-ID: <eb8d92517a0f0489fcacfc175a57bdbc@nomadiclab.com>

> As far as SHA1 is concerned, I guess HITs (and HIP KE) are still quite
> secure. The reason is that HITs are generated from the public keys, so
> an attacker can potentially generate a string that will result in the
> same HITs, however for the attacker to be able to make use of this
> string she must must also be able to generate the private keys
> corresponding to that string.

Well, a potential problem is that HIP allows you to use very short keys 
as your public identifier.  Hence, presumably, an attacker could just 
keep developing new short public key pairs until it finds one that 
matches with the colliding string.
Alternatively, if the attacker can generate a large number of colliding 
strings, the effort of generating a matching key pair may be reduced 
from what it was assumed to be.  So, to me it looks like that attacking 
HIP may indeed have become slightly easier than before.

Apparently replacing the currently used simple hash with a HMAC is 
sufficient to plug the potential leak.  Hence, if people are unwilling 
to move to SHA-256 or 256-bit HITs at this time, I don't see any need.

--Pekka


From shep@alum.mit.edu  Tue Mar  8 17:28:02 2005
From: shep@alum.mit.edu (Tim Shepard)
Date: Tue Mar  8 17:28:02 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: Your message of Tue, 08 Mar 2005 16:01:29 -0600.
 <eb8d92517a0f0489fcacfc175a57bdbc@nomadiclab.com>
Message-ID: <E1D8nAp-0000w9-00@alva.home>


If I understand correctly the newly reported weaknesses in various
hash functions, we have not yet seen a demonstration of a weakness
that would allow an attacker to create a key pair that hashes to a HIT
that you are using.


MD5 weaknesses
--------------

Collisions in md5 have been demonstrated, and more such pairs of md5
inputs that produce collisions can be easily generated.


Furthermore, it has been shown is that you could generate a pair of
RSA key pairs where the two public keys (of differing lengths if you
like) both hash to the same md5 value.

This can also be done (such a pair of key pairs can be found) if there
is known (constant) prefix that will be prepended to the two keys
before they are hashed.  A constant suffix can also be appended to
both, for once the hash function colides, it continues to colide as
you append a constant suffix.

The weaknesses in md5 that allow these attacks do not apply to SHA-1
(as far as I know as of today).


SHA-1 weakness
--------------

Brute-forcing SHA-1 was believed to have a 2^80 work factor, but now
appears to have a 2^69 work factor.  As was recently mentioned on an
IETF mailing list, this is a situation where we can "walk" to a
solution.  (No panic and running around is needed at this time.)
While this is considered a significant new development, the practical
security of systems using SHA-1 are not immediately compromised.
However the long-term suitability of SHA-1 is now in doubt.
(And such doubt, by itself, is enough reason to deprecate the use of
cryptographic algorithms.)


Implications for HIP
--------------------

For HIP I think we need to be able to handle longer HITs, and I think
we need a way of encoding in the HIT itself (in an unambiguous way)
what hash function it is that is supposed to demonstrate the binding
of the HIT to a public key.  (Otherwise, a weakness in one hash
function might allow you to create a public key which can be
"demonstrated" to be bound to a HIT that was created with a different
hash function.)

			-Tim Shepard
			 shep@alum.mit.edu

From Julien.Laganier@Sun.COM  Tue Mar  8 17:54:00 2005
From: Julien.Laganier@Sun.COM (Julien Laganier)
Date: Tue Mar  8 17:54:00 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <E1D8nAp-0000w9-00@alva.home>
References: <E1D8nAp-0000w9-00@alva.home>
Message-ID: <200503082356.53783.julien.laganier@sun.com>

On Tuesday 08 March 2005 23:27, Tim Shepard wrote:

<snip>

> Implications for HIP
> --------------------
>
> For HIP I think we need to be able to handle longer HITs, and I
> think we need a way of encoding in the HIT itself (in an
> unambiguous way) what hash function it is that is supposed to
> demonstrate the binding of the HIT to a public key.  (Otherwise, a
> weakness in one hash function might allow you to create a public
> key which can be "demonstrated" to be bound to a HIT that was
> created with a different hash function.)

I concur with this. BTW if you looks at the HIPHI DNS RR format, it 
already encodes both the HIT algorithm and size.

Also, I am wondering to what extent we might also want to include in 
the HI itself the algorithm used to verify it (e.g. RSA), like Tim's 
proposal for HITs, instead of just signalling this algorithm in the 
HOST_ID TLV.

Or perhaps just say that the HI is the whole HOST_ID TLV...

What does the WG think?

--julien

From jeffrey.m.ahrenholz@boeing.com  Wed Mar  9 12:15:00 2005
From: jeffrey.m.ahrenholz@boeing.com (Ahrenholz, Jeffrey M)
Date: Wed Mar  9 12:15:00 2005
Subject: [Hipsec] FW: WG Review: Better-Than-Nothing Security (btns)
Message-ID: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com>

I wonder if opportunistic HIP could help out here. Originally, I think
that Bob positioned HIP as a lightweight complement to IKE
(draft-moskowitz-hip-00 section 3).

-----Original Message-----
From: IESG Secretary [mailto:iesg-secretary-reply@ietf.org]=20
Sent: Tuesday, March 08, 2005 11:15 AM
To: IETF Announcement list
Subject: WG Review: Better-Than-Nothing Security (btns)=20


A new IETF working group has been proposed in the Security Area.
The IESG has not made any determination as yet. The following=20
description was submitted, and is provided for informational purposes
only.
Please send your comments to the IESG mailing list (iesg@ietf.org) by=20
March 16.=20

+++

Better-Than-Nothing Security (btns)
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Current Status: Proposed Working Group

DESCRIPTION:

Current Internet Protocol security protocol (IPsec) and Internet Key
Exchange protocol (IKE) present somewhat of an all-or-nothing
alternative; these protocols provide protection from a wide array of
possible threats, but are sometimes not deployed because of the need
for pre-existing credentials. There is significant interest in providing
anonymous keying for IPsec
between two parties who do not have credentials suitable for the
current profile of IKE. This mode would protect against passive
attacks but would be vulnerable to active attacks.
The primary purpose of this working group is to specify
extensions to or profiles of IKE to enable this mode of IPsec.
The goal of this relaxed varient of IPsec is to enable and encourage the
use of
network
security where it has been difficult to deploy - notably, to enable
simpler, more rapid deployment.

Two related problems emerged during the discussion of this problem.
First, there is a desire in the KITTEN, RDDP, NFSv4 and potentially
otherc
working groups to perform anonymous authentication at the IPsec layer
and later cryptographically bind the IPsec association to application
authentication. The specification of how this binding is performed
for IPsec and the specification of how the binding interact with
application authentication protocols are out of scope for this working
group. However, the interactions between this cryptographic channel
binding and the IPsec PAD will be similar to those for the anonymous
mode with no binding. This working group needs to consider the
channel bindings use case when developing extensions to the PAD and
SPD.

Secondly, BTNS and the channel bindings work both encourage IPsec to
be used to secure higher layer protocols. AS such we need to consider
what information these higher layer protocols need from IPsec.

Two proposals are under discussion for providing anonymous keing for
IPsec: bare RSA keys transported by IKE and self-signed certificates
transported by IKE.

The WG has the following specific goals over three IETF meetings:

a) develop a framework document to describe the motivation and
goals of these infrastructure-free variants of security protocols
in general, and IPsec and IKE in specific

b) develop an applicability statement, characterizing a reasonable
set of threat models with relaxed assumptions suitable for
infrastructure-free use, and describing the limits and conditions
of appropriate use of infrastructure-free variants

c) develop standards-track IKE extensions and/or profiles that
support one or both of the bare RSA keys or self-signed certificates

d) Specify standards-track extensions to the SPD and PAD to
support anonymous keying for IPsec and cryptographic channel bindings
for IPsec

e) Develop an informational document giving advice to IPsec
implementers and higher-level protocol designers on the use of
IPsec in securing higher-level protocols



_______________________________________________
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce

From pekka.nikander@nomadiclab.com  Wed Mar  9 15:36:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Wed Mar  9 15:36:01 2005
Subject: [Hipsec] FW: WG Review: Better-Than-Nothing Security (btns)
In-Reply-To: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com>
References: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com>
Message-ID: <8e4686f7143576ff768097da222c1452@nomadiclab.com>

> I wonder if opportunistic HIP could help out here. Originally, I think
> that Bob positioned HIP as a lightweight complement to IKE
> (draft-moskowitz-hip-00 section 3).

As a quick response: yes, from a functional point of view.

However, many of the security folks do not want to consider HIP,
they want to use IKEv2.  I think the attitude is very rational
from their point of view.  In general, people are much more
confident that IKEv2 is secure vs. whether HIP is secure or not.

--Pekka

>
> -----Original Message-----
> From: IESG Secretary [mailto:iesg-secretary-reply@ietf.org]
> Sent: Tuesday, March 08, 2005 11:15 AM
> To: IETF Announcement list
> Subject: WG Review: Better-Than-Nothing Security (btns)
>
>
> A new IETF working group has been proposed in the Security Area.
> The IESG has not made any determination as yet. The following
> description was submitted, and is provided for informational purposes
> only.
> Please send your comments to the IESG mailing list (iesg@ietf.org) by
> March 16.
>
> +++
>
> Better-Than-Nothing Security (btns)
> ===================================
>
> Current Status: Proposed Working Group
>
> DESCRIPTION:
>
> Current Internet Protocol security protocol (IPsec) and Internet Key
> Exchange protocol (IKE) present somewhat of an all-or-nothing
> alternative; these protocols provide protection from a wide array of
> possible threats, but are sometimes not deployed because of the need
> for pre-existing credentials. There is significant interest in 
> providing
> anonymous keying for IPsec
> between two parties who do not have credentials suitable for the
> current profile of IKE. This mode would protect against passive
> attacks but would be vulnerable to active attacks.
> The primary purpose of this working group is to specify
> extensions to or profiles of IKE to enable this mode of IPsec.
> The goal of this relaxed varient of IPsec is to enable and encourage 
> the
> use of
> network
> security where it has been difficult to deploy - notably, to enable
> simpler, more rapid deployment.
>
> Two related problems emerged during the discussion of this problem.
> First, there is a desire in the KITTEN, RDDP, NFSv4 and potentially
> otherc
> working groups to perform anonymous authentication at the IPsec layer
> and later cryptographically bind the IPsec association to application
> authentication. The specification of how this binding is performed
> for IPsec and the specification of how the binding interact with
> application authentication protocols are out of scope for this working
> group. However, the interactions between this cryptographic channel
> binding and the IPsec PAD will be similar to those for the anonymous
> mode with no binding. This working group needs to consider the
> channel bindings use case when developing extensions to the PAD and
> SPD.
>
> Secondly, BTNS and the channel bindings work both encourage IPsec to
> be used to secure higher layer protocols. AS such we need to consider
> what information these higher layer protocols need from IPsec.
>
> Two proposals are under discussion for providing anonymous keing for
> IPsec: bare RSA keys transported by IKE and self-signed certificates
> transported by IKE.
>
> The WG has the following specific goals over three IETF meetings:
>
> a) develop a framework document to describe the motivation and
> goals of these infrastructure-free variants of security protocols
> in general, and IPsec and IKE in specific
>
> b) develop an applicability statement, characterizing a reasonable
> set of threat models with relaxed assumptions suitable for
> infrastructure-free use, and describing the limits and conditions
> of appropriate use of infrastructure-free variants
>
> c) develop standards-track IKE extensions and/or profiles that
> support one or both of the bare RSA keys or self-signed certificates
>
> d) Specify standards-track extensions to the SPD and PAD to
> support anonymous keying for IPsec and cryptographic channel bindings
> for IPsec
>
> e) Develop an informational document giving advice to IPsec
> implementers and higher-level protocol designers on the use of
> IPsec in securing higher-level protocols
>
>
>
> _______________________________________________
> IETF-Announce mailing list
> IETF-Announce@ietf.org
> https://www1.ietf.org/mailman/listinfo/ietf-announce
> _______________________________________________
> Hipsec mailing list
> Hipsec@honor.trusecure.com
> http://honor.trusecure.com/mailman/listinfo/hipsec
>


From yushunwa@ISI.EDU  Wed Mar  9 17:08:00 2005
From: yushunwa@ISI.EDU (Yushun Wang)
Date: Wed Mar  9 17:08:00 2005
Subject: [Hipsec] FW: WG Review: Better-Than-Nothing Security (btns)
In-Reply-To: <8e4686f7143576ff768097da222c1452@nomadiclab.com>
References: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com> <8e4686f7143576ff768097da222c1452@nomadiclab.com>
Message-ID: <422F737D.2010003@isi.edu>

This is a cryptographically signed message in MIME format.

--------------ms020406020508090401010309
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Pekka Nikander wrote:
>> I wonder if opportunistic HIP could help out here. Originally, I think
>> that Bob positioned HIP as a lightweight complement to IKE
>> (draft-moskowitz-hip-00 section 3).

> As a quick response: yes, from a functional point of view.
> 
> However, many of the security folks do not want to consider HIP,
> they want to use IKEv2.  I think the attitude is very rational
> from their point of view.  In general, people are much more
> confident that IKEv2 is secure vs. whether HIP is secure or not.

My view is slightly different. To me the question is
whether the concept of btns or anonsec applies to
HIP or not, and whether HIP protocol specs _prevent_
the use of anonymous mode or other "less secure"
modes.

I am sure most would agree the answer is "yes" for the
first question, though I am not familiar with HIP enough
to offer definitive answers.

As for IKE vs. HIP, the current focus of wg-to-be's effort
is on IPsec, but it is entirely possible to have a doc on
how to provide similar services in HIP. Of course I could
only speak for myself on this matter.

IMO this is another example to Tom's generalization draft.
Apologize if I misunderstood Tom's draft, should've read it
first. :-) I would really like to support Tom's effort to
going through the HIP arch/spec and maybe relaxes certain
MUSTs or MUST-NOTs in a manner that would not cause huge
pain for inter-op tests for implementers, but would open
the possibilities to support wider range of arch/services/
apps/etc.

yushun

>> -----Original Message-----
>> From: IESG Secretary [mailto:iesg-secretary-reply@ietf.org]
>> Sent: Tuesday, March 08, 2005 11:15 AM
>> To: IETF Announcement list
>> Subject: WG Review: Better-Than-Nothing Security (btns)
>>
>>
>> A new IETF working group has been proposed in the Security Area.
>> The IESG has not made any determination as yet. The following
>> description was submitted, and is provided for informational purposes
>> only.
>> Please send your comments to the IESG mailing list (iesg@ietf.org) by
>> March 16.
>>
>> +++
>>
>> Better-Than-Nothing Security (btns)
>> ===================================
>>
>> Current Status: Proposed Working Group
>>
>> DESCRIPTION:
>>
>> Current Internet Protocol security protocol (IPsec) and Internet Key
>> Exchange protocol (IKE) present somewhat of an all-or-nothing
>> alternative; these protocols provide protection from a wide array of
>> possible threats, but are sometimes not deployed because of the need
>> for pre-existing credentials. There is significant interest in providing
>> anonymous keying for IPsec
>> between two parties who do not have credentials suitable for the
>> current profile of IKE. This mode would protect against passive
>> attacks but would be vulnerable to active attacks.
>> The primary purpose of this working group is to specify
>> extensions to or profiles of IKE to enable this mode of IPsec.
>> The goal of this relaxed varient of IPsec is to enable and encourage the
>> use of
>> network
>> security where it has been difficult to deploy - notably, to enable
>> simpler, more rapid deployment.
>>
>> Two related problems emerged during the discussion of this problem.
>> First, there is a desire in the KITTEN, RDDP, NFSv4 and potentially
>> otherc
>> working groups to perform anonymous authentication at the IPsec layer
>> and later cryptographically bind the IPsec association to application
>> authentication. The specification of how this binding is performed
>> for IPsec and the specification of how the binding interact with
>> application authentication protocols are out of scope for this working
>> group. However, the interactions between this cryptographic channel
>> binding and the IPsec PAD will be similar to those for the anonymous
>> mode with no binding. This working group needs to consider the
>> channel bindings use case when developing extensions to the PAD and
>> SPD.
>>
>> Secondly, BTNS and the channel bindings work both encourage IPsec to
>> be used to secure higher layer protocols. AS such we need to consider
>> what information these higher layer protocols need from IPsec.
>>
>> Two proposals are under discussion for providing anonymous keing for
>> IPsec: bare RSA keys transported by IKE and self-signed certificates
>> transported by IKE.
>>
>> The WG has the following specific goals over three IETF meetings:
>>
>> a) develop a framework document to describe the motivation and
>> goals of these infrastructure-free variants of security protocols
>> in general, and IPsec and IKE in specific
>>
>> b) develop an applicability statement, characterizing a reasonable
>> set of threat models with relaxed assumptions suitable for
>> infrastructure-free use, and describing the limits and conditions
>> of appropriate use of infrastructure-free variants
>>
>> c) develop standards-track IKE extensions and/or profiles that
>> support one or both of the bare RSA keys or self-signed certificates
>>
>> d) Specify standards-track extensions to the SPD and PAD to
>> support anonymous keying for IPsec and cryptographic channel bindings
>> for IPsec
>>
>> e) Develop an informational document giving advice to IPsec
>> implementers and higher-level protocol designers on the use of
>> IPsec in securing higher-level protocols



--------------ms020406020508090401010309
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJeTCC
AxcwggKAoAMCAQICAw4K/TANBgkqhkiG9w0BAQQFADBiMQswCQYDVQQGEwJaQTElMCMGA1UE
ChMcVGhhd3RlIENvbnN1bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNv
bmFsIEZyZWVtYWlsIElzc3VpbmcgQ0EwHhcNMDUwMjE1MjIyMDQ0WhcNMDYwMjE1MjIyMDQ0
WjB6MQ0wCwYDVQQEEwRXYW5nMRAwDgYDVQQqEwdZdS1TaHVuMRUwEwYDVQQDEwxZdS1TaHVu
IFdhbmcxHzAdBgkqhkiG9w0BCQEWEHl1c2h1bndhQGlzaS5lZHUxHzAdBgkqhkiG9w0BCQEW
EHl1c2h1bndhQHVzYy5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCpbzTn
ssgn3J00Mbb7NiBsaUnnnXeJKrXZM5bDChNw3BZcmZKQwKQA1EZqc10z0AOhg6azfLhKJK2Y
6JKoTOHDdLmgWbHy9L5EGUi2+hWh39nXPqlnk+MMWH+nmWBW2mr5E5n+vHrCS7kp6mr2QGuU
D3yolypb0TKrUFWo8RUz2N+0GRz3MXquyLLm2twIn4pAgxbI8gnkba9LLWfA+fKkpyAx2421
dOlKsAmlA6gL1NmXw0bC8o3tNvxxlvJK9Y3G61/wpo4bbHRtVUDbk3evv+NHwNOHb8MZzIEY
6m1KAnGJzCz406bbDCxkRuKJkX5a0Srx8gyQNfmpmbLShHJtAgMBAAGjPzA9MC0GA1UdEQQm
MCSBEHl1c2h1bndhQGlzaS5lZHWBEHl1c2h1bndhQHVzYy5lZHUwDAYDVR0TAQH/BAIwADAN
BgkqhkiG9w0BAQQFAAOBgQCe4GN9Ke0+xslYMGSeJWrLNujx4ecZ48emfbWgnEfdAP77HKQC
7vomxYXs2NfhoDt/cgado9v7sgRqPen/lUYCwneXM0O9dcsWqfCGBH3iEcDQsr1eX+PhQbxR
nPRYY+m+rU4n9bma6bdovN4CA1VAg7cI8lrp4sDuRU8frC7bDjCCAxcwggKAoAMCAQICAw4K
/TANBgkqhkiG9w0BAQQFADBiMQswCQYDVQQGEwJaQTElMCMGA1UEChMcVGhhd3RlIENvbnN1
bHRpbmcgKFB0eSkgTHRkLjEsMCoGA1UEAxMjVGhhd3RlIFBlcnNvbmFsIEZyZWVtYWlsIElz
c3VpbmcgQ0EwHhcNMDUwMjE1MjIyMDQ0WhcNMDYwMjE1MjIyMDQ0WjB6MQ0wCwYDVQQEEwRX
YW5nMRAwDgYDVQQqEwdZdS1TaHVuMRUwEwYDVQQDEwxZdS1TaHVuIFdhbmcxHzAdBgkqhkiG
9w0BCQEWEHl1c2h1bndhQGlzaS5lZHUxHzAdBgkqhkiG9w0BCQEWEHl1c2h1bndhQHVzYy5l
ZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCpbzTnssgn3J00Mbb7NiBsaUnn
nXeJKrXZM5bDChNw3BZcmZKQwKQA1EZqc10z0AOhg6azfLhKJK2Y6JKoTOHDdLmgWbHy9L5E
GUi2+hWh39nXPqlnk+MMWH+nmWBW2mr5E5n+vHrCS7kp6mr2QGuUD3yolypb0TKrUFWo8RUz
2N+0GRz3MXquyLLm2twIn4pAgxbI8gnkba9LLWfA+fKkpyAx2421dOlKsAmlA6gL1NmXw0bC
8o3tNvxxlvJK9Y3G61/wpo4bbHRtVUDbk3evv+NHwNOHb8MZzIEY6m1KAnGJzCz406bbDCxk
RuKJkX5a0Srx8gyQNfmpmbLShHJtAgMBAAGjPzA9MC0GA1UdEQQmMCSBEHl1c2h1bndhQGlz
aS5lZHWBEHl1c2h1bndhQHVzYy5lZHUwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQQFAAOB
gQCe4GN9Ke0+xslYMGSeJWrLNujx4ecZ48emfbWgnEfdAP77HKQC7vomxYXs2NfhoDt/cgad
o9v7sgRqPen/lUYCwneXM0O9dcsWqfCGBH3iEcDQsr1eX+PhQbxRnPRYY+m+rU4n9bma6bdo
vN4CA1VAg7cI8lrp4sDuRU8frC7bDjCCAz8wggKooAMCAQICAQ0wDQYJKoZIhvcNAQEFBQAw
gdExCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUg
VG93bjEaMBgGA1UEChMRVGhhd3RlIENvbnN1bHRpbmcxKDAmBgNVBAsTH0NlcnRpZmljYXRp
b24gU2VydmljZXMgRGl2aXNpb24xJDAiBgNVBAMTG1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFp
bCBDQTErMCkGCSqGSIb3DQEJARYccGVyc29uYWwtZnJlZW1haWxAdGhhd3RlLmNvbTAeFw0w
MzA3MTcwMDAwMDBaFw0xMzA3MTYyMzU5NTlaMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxU
aGF3dGUgQ29uc3VsdGluZyAoUHR5KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwg
RnJlZW1haWwgSXNzdWluZyBDQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxKY8VXNV
+065yplaHmjAdQRwnd/p/6Me7L3N9VvyGna9fww6YfK/Uc4B1OVQCjDXAmNaLIkVcI7dyfAr
hVqqP3FWy688Cwfn8R+RNiQqE88r1fOCdz0Dviv+uxg+B79AgAJk16emu59l0cUqVIUPSAR/
p7bRPGEEQB5kGXJgt/sCAwEAAaOBlDCBkTASBgNVHRMBAf8ECDAGAQH/AgEAMEMGA1UdHwQ8
MDowOKA2oDSGMmh0dHA6Ly9jcmwudGhhd3RlLmNvbS9UaGF3dGVQZXJzb25hbEZyZWVtYWls
Q0EuY3JsMAsGA1UdDwQEAwIBBjApBgNVHREEIjAgpB4wHDEaMBgGA1UEAxMRUHJpdmF0ZUxh
YmVsMi0xMzgwDQYJKoZIhvcNAQEFBQADgYEASIzRUIPqCy7MDaNmrGcPf6+svsIXoUOWlJ1/
TCG4+DYfqi2fNi/A9BxQIJNwPP2t4WFiw9k6GX6EsZkbAMUaC4J0niVQlGLH2ydxVyWN3amc
OY6MIE9lX5Xa9/eH1sYITq726jTlEBpbNU1341YheILcIRk13iSx0x1G/11fZU8xggM7MIID
NwIBATBpMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGluZyAoUHR5
KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgSXNzdWluZyBDQQID
Dgr9MAkGBSsOAwIaBQCgggGnMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcN
AQkFMQ8XDTA1MDMwOTIyMDY1NFowIwYJKoZIhvcNAQkEMRYEFHSWVGBxZrUNpDMKE3AWbbDG
vzndMFIGCSqGSIb3DQEJDzFFMEMwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqG
SIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMHgGCSsGAQQBgjcQBDFrMGkwYjEL
MAkGA1UEBhMCWkExJTAjBgNVBAoTHFRoYXd0ZSBDb25zdWx0aW5nIChQdHkpIEx0ZC4xLDAq
BgNVBAMTI1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFpbCBJc3N1aW5nIENBAgMOCv0wegYLKoZI
hvcNAQkQAgsxa6BpMGIxCzAJBgNVBAYTAlpBMSUwIwYDVQQKExxUaGF3dGUgQ29uc3VsdGlu
ZyAoUHR5KSBMdGQuMSwwKgYDVQQDEyNUaGF3dGUgUGVyc29uYWwgRnJlZW1haWwgSXNzdWlu
ZyBDQQIDDgr9MA0GCSqGSIb3DQEBAQUABIIBAFIB+BBnwaRzYJq6vNIfbE2l1Eqcw83H9TBp
2yvwxtmwFkEvdwQhZsg2+FqDUiQ74N5Wb4DOOCaZDAC7hNO1cvO6cv7YE53GkdXSHY0haTcm
Uv+WgtLLwygGBTu4C/ie104jYdodT7N39RBrSqBowpTFX+f2WY1HRik8U4PwQ/+6CfBJ9zJD
O4y5nrM58u5o09UplyrRv/szGbPjKQ9Lbtw41MI70OegxVBKpqBAw/wBaLAz/dW/Xk1OSf+a
9NsYErtJhmh1/g980BPaI4GS19HqXhWsK6ZZrw1HA97n7urpRDS/zwXZ60rAteU9mjsjWxkG
KqrISvCh+p6cqfK1ACwAAAAAAAA=
--------------ms020406020508090401010309--

From pekka.nikander@nomadiclab.com  Wed Mar  9 17:28:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Wed Mar  9 17:28:01 2005
Subject: [Hipsec] FW: WG Review: Better-Than-Nothing Security (btns)
In-Reply-To: <422F737D.2010003@isi.edu>
References: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com> <8e4686f7143576ff768097da222c1452@nomadiclab.com> <422F737D.2010003@isi.edu>
Message-ID: <87613825f91ff7da18aa42ae06265aa0@nomadiclab.com>

> My view is slightly different. To me the question is
> whether the concept of btns or anonsec applies to
> HIP or not, and whether HIP protocol specs _prevent_
> the use of anonymous mode or other "less secure"
> modes.

Well, as far as I can see, HIP-as-is does not specify
anything else but a btns-like mode.  HIP does have the
CER packet type for carrying certificates, but how to
use certificates is out of scope.  Hence, base HIP only
defines a protocol that provides the application assurance
that the peer has access to the private key corresponding
to the host identity, i.e., the public key.  How the
application gets the public key (or the corresponding HIT)
is out of scope.

So, I can't see how the HIP specs would prevent one from
using "anonymous" or "less secure" mode.  It even allows
you to use very short public and Diffie-Hellman keys.

> As for IKE vs. HIP, the current focus of wg-to-be's effort
> is on IPsec, but it is entirely possible to have a doc on
> how to provide similar services in HIP. Of course I could
> only speak for myself on this matter.

Well, what I am hoping from the anonsec effort is to get
a standard interface to the SPD and PAD that would allow
the KMP to push a hash of a public key down the stack and
associate that with an SA.  That would most probably make
any HIP implementation easier, perhaps to the point that
one could implement HIP on the "top" of existing IPsec
without requiring any changes to the kernel.  If that happens,
we don't need any document on how to provide similar services
with HIP, as they *are* already there.

Taking two steps back, I really think that we should gradually
inch ourselves towards a model where the application level
identifiers have build-in channel bindings.  HIP, when used
with a HIT-based API, provides that.  I think it would be good
if IPsec supported that, too.

--Pekka


From yushunwa@ISI.EDU  Wed Mar  9 18:06:01 2005
From: yushunwa@ISI.EDU (Yushun Wang)
Date: Wed Mar  9 18:06:01 2005
Subject: [Hipsec] FW: WG Review: Better-Than-Nothing Security (btns)
In-Reply-To: <87613825f91ff7da18aa42ae06265aa0@nomadiclab.com>
References: <2B3DC5CC87DC754E8EF8B9271F91AA2702361F6D@xch-nw-09.nw.nos.boeing.com> <8e4686f7143576ff768097da222c1452@nomadiclab.com> <422F737D.2010003@isi.edu> <87613825f91ff7da18aa42ae06265aa0@nomadiclab.com>
Message-ID: <422F810F.9080806@isi.edu>

This is a cryptographically signed message in MIME format.

--------------ms090801050908010008000808
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Pekka Nikander wrote:
>> My view is slightly different. To me the question is
>> whether the concept of btns or anonsec applies to
>> HIP or not, and whether HIP protocol specs _prevent_
>> the use of anonymous mode or other "less secure"
>> modes.

> Well, as far as I can see, HIP-as-is does not specify
> anything else but a btns-like mode.  HIP does have the
> CER packet type for carrying certificates, but how to
> use certificates is out of scope.  Hence, base HIP only
> defines a protocol that provides the application assurance
> that the peer has access to the private key corresponding
> to the host identity, i.e., the public key.  How the
> application gets the public key (or the corresponding HIT)
> is out of scope.
> 
> So, I can't see how the HIP specs would prevent one from
> using "anonymous" or "less secure" mode.  It even allows
> you to use very short public and Diffie-Hellman keys.

Thanks for the authoritative answers. :-) I stand corrected.

>> As for IKE vs. HIP, the current focus of wg-to-be's effort
>> is on IPsec, but it is entirely possible to have a doc on
>> how to provide similar services in HIP. Of course I could
>> only speak for myself on this matter.

> Well, what I am hoping from the anonsec effort is to get
> a standard interface to the SPD and PAD that would allow
> the KMP to push a hash of a public key down the stack and
> associate that with an SA.  That would most probably make
> any HIP implementation easier, perhaps to the point that
> one could implement HIP on the "top" of existing IPsec
> without requiring any changes to the kernel.  If that happens,
> we don't need any document on how to provide similar services
> with HIP, as they *are* already there.

Agree on this. Let's keep our fingers crossed...

yushun


> Taking two steps back, I really think that we should gradually
> inch ourselves towards a model where the application level
> identifiers have build-in channel bindings.  HIP, when used
> with a HIT-based API, provides that.  I think it would be good
> if IPsec supported that, too.




--------------ms090801050908010008000808
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms090801050908010008000808--

From Gonzalo.Camarillo@ericsson.com  Wed Mar  9 18:21:01 2005
From: Gonzalo.Camarillo@ericsson.com (Gonzalo Camarillo)
Date: Wed Mar  9 18:21:01 2005
Subject: [Hipsec] Null IPsec
Message-ID: <422F84B5.8050209@ericsson.com>

Folks,

during today's meeting, the chairs got an action point to talk to the 
security ADs about the possibility of having a MUST implement IPsec with 
null encryption and/or null integrity protection.

I talked to Russ, and his gut reaction was that null encryption with 
integrity may be fine, but he would need to see the use case people have 
in mind before accepting null encryption and null integrity.

Gonzalo

From chvogt@tm.uka.de  Wed Mar  9 19:07:01 2005
From: chvogt@tm.uka.de (Christian Vogt)
Date: Wed Mar  9 19:07:01 2005
Subject: [Hipsec] Time Window Instead of CBA?
Message-ID: <422F8F87.6080007@tm.uka.de>

Hi Julien, hi all.

Julien came to the microphone after my presentation today, but we didn't 
have enough time to go into his comment to the extent due.

The question was whether we could not just allow a correspondent node to 
send packets to an unverified locator for a certain time window instead 
of using Credit-Based Authorization.

Intuitively, one would say that this time window should be one RTT, 
which is what a reachability verification takes.  However, since the RTT 
for a new locator may be completely different than a previously computed 
RTT, one would probably end up using a higher, constant value. 
(Besides, it is not clear where to get the RTT from at the IP layer. 
Transport-layer protocols may compute the RTT, but usually do not reset 
this value upon a handover.)

Anyway, no matter what lifetime we pick for an unverified locator, the 
question is:  What would prevent an attacker to re-register an 
unverified locator again and again?  One may argue that the 
correspondent node could require a successful reachability verification 
before allowing a mobile node to register a new unverified locator.  But 
that might cause DoS against an upright mobile node that moves quickly 
enough such that a new locator becomes stale before it can be verified.

Without getting too much into this, I hope this makes clear that finding 
a feasible heuristic for the correspondent node is not easy.  There is 
also some text (section 5.8) in 
draft-irtf-mobopts-ro-enhancements-00.txt.  And I had a slide on this in 
my presentation which I had to skip in the interest of time.  (The 
slides are posted.)

I guess that, in summary, it's feasible to say that heuristics quickly 
become more complex than Credit-Based Authorization.  After all, CBA is 
really not much from an implementation perspective:  It's just some byte 
counting when a packet is received, and checking the current credit 
balance when a packet is to be sent to an unverified locator.  Note that 
one does not need a timer to realize credit aging.

Maybe, other folks have a comment on this as well.

Regards,

- Christian

-- 
Christian Vogt, Institute of Telematics, University of Karlsruhe
www.tm.uka.de/~chvogt/pubkey/



From jari.arkko@piuha.net  Wed Mar  9 20:46:01 2005
From: jari.arkko@piuha.net (Jari Arkko)
Date: Wed Mar  9 20:46:01 2005
Subject: [Hipsec] Time Window Instead of CBA?
In-Reply-To: <422F8F87.6080007@tm.uka.de>
References: <422F8F87.6080007@tm.uka.de>
Message-ID: <422FA6D0.6080609@piuha.net>

Christian Vogt wrote:

> Without getting too much into this, I hope this makes clear that 
> finding a feasible heuristic for the correspondent node is not easy.  
> There is also some text (section 5.8) in 
> draft-irtf-mobopts-ro-enhancements-00.txt.  And I had a slide on this 
> in my presentation which I had to skip in the interest of time.  (The 
> slides are posted.)
>
> I guess that, in summary, it's feasible to say that heuristics quickly 
> become more complex than Credit-Based Authorization.  After all, CBA 
> is really not much from an implementation perspective:  It's just some 
> byte counting when a packet is received, and checking the current 
> credit balance when a packet is to be sent to an unverified locator.  
> Note that one does not need a timer to realize credit aging.

I agree.

--Jari


From chvogt@tm.uka.de  Wed Mar  9 22:19:01 2005
From: chvogt@tm.uka.de (Christian Vogt)
Date: Wed Mar  9 22:19:01 2005
Subject: [Hipsec] CBA Presentation Slides
Message-ID: <422FBC76.4060800@tm.uka.de>

Hi all,

Gonzalo just posted a PDF of my presentation slides.  I serialized the 
animations in it, making it more readable.

http://hip.piuha.net/meetings/ietf62/agenda.html

- Christian

-- 
Christian Vogt, Institute of Telematics, University of Karlsruhe
www.tm.uka.de/~chvogt/pubkey/




From rgm@htt-consult.com  Thu Mar 10 10:47:01 2005
From: rgm@htt-consult.com (Robert Moskowitz)
Date: Thu Mar 10 10:47:01 2005
Subject: [Hipsec] Weighing in on hash truncation
In-Reply-To: <422F84B5.8050209@ericsson.com>
References: <422F84B5.8050209@ericsson.com>
Message-ID: <6.2.1.2.2.20050310103704.0512ea18@localhost>

Most of the work on hash truncation came from Hugo's work back in '95.  So=
=20
I went to the source.

I am asking him about the pre-image attack (find (x,y) where H9x) =3D H(y)).

But I am not sure the security risk of the pre-image attack.  The only case=
=20
I can see is Malice got hired to create a HI for a public server.  But=20
Malice creates a HI with a collision and walks off with the collision and=20
sets up his own version of this server.

Date: Thu, 10 Mar 2005 01:26:16 +0200 (IST)
From: Hugo Krawczyk <hugo@ee.technion.ac.il>
To: Robert Moskowitz <rgm@icsalabs.com>
Subject: Re: Truncating Hashes in this new world weakened hashes
In-Reply-To: <6.2.1.2.2.20050309141335.038a1b40@localhost>
Message-ID:=20
<Pine.GSO.4.44_heb2.09.0503100110230.15572-100000@ee.technion.ac.il>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=3DUS-ASCII

I am not familiar with HIP. If the application uses the one-way
(or second pre-image) property of SHA-1
(namely, given a pair (x,H(x)) find y such that H(x)=3DH(y)),
then SHA-1 is still secure for all we know even if you truncate the output
moderately (say to 96 or more bits). In particular this is the case if in
the application the attacker does not have control of the public key
(but rather needs to find another public key that hashes to the same
value).

Assuming that indeed the issue in your application is one-wayness and not
collisions then I do not see a reason to move immediately to SHA-256.
It would be better to see how well the available techniques can be
stretched to work against the one-wayness of SHA-1. Indeed, breaking
one-wayness is a much harder
problem with more safety margins since the basic brute force attack takes
2^160 rather than 2^80 (even if you truncate to 128 bits the brute
force attack takes 2^128) and therefore a new attack will have to be
about 2^50 times faster to be of any practical value.

Hugo

On Wed, 9 Mar 2005, Robert Moskowitz wrote:

 > Hugo,
 >
 > I greatly need some supporting information on the strengths of truncated
 > hashes.
 >
 > This question is coming for the work in HIP
 >
 > www.ietf.org/internet-drafts/draft-ietf-hip-arch-02.txt
 > www.ietf.org/internet-drafts/draft-ietf-hip-base-02.txt
 >
 > The Host Identity is a Public Key, (RSA or DSA)
 >
 > But you don't want to use a variable length field in the ways needed in
 > HIP, thus we truncate a hash of the public key at 126 bits.Currently
 > SHA-1 is used for the hashing.And there is concern about the long term
 > use of SHA-1 here.
 >
 > But since this is a truncation of a hash, some wonder if going to SHA-256
 > will actually be more secure.
 >
 > It seems to me that the attacks are to create hash collisions, not
 > truncated hash collisions.Thus it is not a  matter of the length of the
 > truncation (within reason) as it is the collisions with the hash itself.
 >
 > Can you point me to any information on this?
 >
 > Robert Moskowitz


"Perfection is achieved not when there is nothing more to
add, but rather, when there is nothing left to take away"

Antoine de Saint-Exup=E9ry (1900-1944)



From Julien.Laganier@Sun.COM  Thu Mar 10 12:38:01 2005
From: Julien.Laganier@Sun.COM (Julien Laganier)
Date: Thu Mar 10 12:38:01 2005
Subject: [Hipsec] Time Window Instead of CBA?
In-Reply-To: <422FA6D0.6080609@piuha.net>
References: <422F8F87.6080007@tm.uka.de> <422FA6D0.6080609@piuha.net>
Message-ID: <200503101841.10575.julien.laganier@sun.com>

On Thursday 10 March 2005 02:45, Jari Arkko wrote:
> Christian Vogt wrote:
> >
> > I guess that, in summary, it's feasible to say that heuristics
> > quickly become more complex than Credit-Based Authorization. 
> > After all, CBA is really not much from an implementation
> > perspective:  It's just some byte counting when a packet is
> > received, and checking the current credit balance when a packet
> > is to be sent to an unverified locator. Note that one does not
> > need a timer to realize credit aging.
>
> I agree.

Right. After discussing more with Christian I now agree too.

--julien 

From pekka.nikander@nomadiclab.com  Thu Mar 10 14:17:00 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Thu Mar 10 14:17:00 2005
Subject: [Hipsec] Time Window Instead of CBA?
In-Reply-To: <422FA6D0.6080609@piuha.net>
References: <422F8F87.6080007@tm.uka.de> <422FA6D0.6080609@piuha.net>
Message-ID: <d248c4d0da6f60ccc73cd1e1991da582@nomadiclab.com>

>> It's just some byte counting when a packet is received, and checking 
>> the current credit balance when a packet is to be sent to an 
>> unverified locator.

Note that in the case of HIP most of the required machinery is already 
there, as the ESP SAs keep a count on bytes anyway.

--Pekka


From chvogt@tm.uka.de  Thu Mar 10 14:33:01 2005
From: chvogt@tm.uka.de (Christian Vogt)
Date: Thu Mar 10 14:33:01 2005
Subject: [Hipsec] Time Window Instead of CBA?
In-Reply-To: <d248c4d0da6f60ccc73cd1e1991da582@nomadiclab.com>
References: <422F8F87.6080007@tm.uka.de> <422FA6D0.6080609@piuha.net> <d248c4d0da6f60ccc73cd1e1991da582@nomadiclab.com>
Message-ID: <4230A0D6.80005@tm.uka.de>

Yes, you can re-use code that exists anyway.

Likewise, in our CBA implementation for Mobile IPv6, we use a 
correspondent node's Binding Cache to store the IP-address state 
(verified, unverified) and a byte counter for each registered mobile 
node.  You can do similar things for HIP mobility as well.

- Christian


Pekka Nikander wrote:
>>> It's just some byte counting when a packet is received, and checking 
>>> the current credit balance when a packet is to be sent to an 
>>> unverified locator.
> 
> 
> Note that in the case of HIP most of the required machinery is already 
> there, as the ESP SAs keep a count on bytes anyway.
> 
> --Pekka

-- 
Christian Vogt, Institute of Telematics, University of Karlsruhe
www.tm.uka.de/~chvogt/pubkey/


From pekka.nikander@nomadiclab.com  Fri Mar 11 10:28:03 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Fri Mar 11 10:28:03 2005
Subject: [Hipsec] HIP RG today starts at 1230, not 1300 as listed in Agenda
Message-ID: <4727b872bed44442a7644919dc8007ab@nomadiclab.com>

The agenda lists the HIP RG to start at 1300, and lists
last meeting's agenda.  However, we *are* starting
already at 1230, not 1300 as listed.  See the archive
for the proposed agenda:

http://honor.trusecure.com/pipermail/hipsec-rg/2005-February/000146.html

Tom is back home so I will be chairing.

--Pekka


From wivancic@grc.nasa.gov  Fri Mar 11 16:50:00 2005
From: wivancic@grc.nasa.gov (ivancic)
Date: Fri Mar 11 16:50:00 2005
Subject: [Hipsec] NAT traversal and cellular network administrative filtering
Message-ID: <42321250.7030609@grc.nasa.gov>

Please excuse the cross-post.

This week I sat in 4 IETF sessions that all where discussing very
similar, if not the same, problem of NAT traversal. HIP, MIP6 and NEMO
where generally discussing 6 to 4 tunneling issues and the need to
address NATs. MIP4 was not concerned with 6 to 4 tunneling, just NAT
traversal in general.

I have used Cisco’s mobile networking MIP4 code with NAT traversal and
Cisco’s (draft-thubert-nemo-ipv4-traversal-01 - expired) Doors 6 to 4
UDP-base tunneling NAT traversal code.

Both work, but here is something to be aware of. About 18 months ago we
noticed T-Mobile began administratively filtering traffic. The end
result is that traffic that does not originate from the T-Mobile network
gets blocked. They appear to be using ports to map the traffic. Thus,
and IP-in-IP tunnel gets blocked even though the initial traffic came
from within T-Mobile’s network (no ports to map to for IP-in-IP
tunnels). UDP tunnels operate over this. That is why we used T-Mobile’s
links for an mobile-ipv6 demonstration. The Doors implementation could
handle this.

(See: http://roland.grc.nasa.gov/~ivancic/ICNS2004_Demo/ICNS2004_Demo.htm)

Sprint and Verizon may have recently started administratively filtering
data – similar result as NATing even though you have unchanged public
address space. One way to cope with this is UDP-in-IP tunneling, the
same as with NAT traversal code.

NOTE: Depending on the implementation, you may have to force UDP
tunneling, because the address is not changing (CoA and actual address).
Thus, there is no easy way to auto-sense that you are getting
administratively filtered. I suspect this will break a lot of
implementations for NAT traversal – as this really isn’t NAT traversal,
but “weak” firewall traversal.

I spoke to T-Mobile when this first started happening (actually found
the right person). They said that the filtering was put into place to
eliminate worms probing the networks. The filtering was done no so much
for security as to protect the valuable RF bandwidth. T-Mobile is GPRS
and you really get somewhere around 30 kbps in practice. Sprint and
Verizon are 1xRTT and get around 40 to 60 kbps in practice. Thus, worms
were starting to effect the usable bandwidth and QoS – or at least that
was the fear. Thus, I agree with their security implementations as the
reasoning appears valid.

See this URL for the T-Mobile problem:
http://roland.grc.nasa.gov/~ivancic/t-mobile
<http://roland.grc.nasa.gov/%7Eivancic/t-mobile>
http://roland.grc.nasa.gov/~ivancic/t-mobile/Letter_Customer_Service.pdf
<http://roland.grc.nasa.gov/%7Eivancic/t-mobile/Letter_Customer_Service.pdf> 


http://roland.grc.nasa.gov/~ivancic/t-mobile/administrative_filtering.pdf
<http://roland.grc.nasa.gov/%7Eivancic/t-mobile/administrative_filtering.pdf> 



NATs breaks a lot of things. Security breaks the rest! J



Will Ivancic



From gmp@research.panasonic.com  Mon Mar 14 11:52:00 2005
From: gmp@research.panasonic.com (Greg Perkins)
Date: Mon Mar 14 11:52:00 2005
Subject: [Hipsec] SHA1 broken?
References: <E1D8nAp-0000w9-00@alva.home>
 <200503082356.53783.julien.laganier@sun.com>
Message-ID: <00fb01c528b8$488de740$ef01a996@gmp>

If you add a check that the RSA public key (the HI) must be of at least a
certain length then this attack stays very difficult because key generation
is a O(n^4) operation.  I have yet to get the details on this new SHA1
attack but can elaborate on this further when I do.

I do agree that the encoding should include a few semantic bits, like Pekka
discussed at the meeting.  I'd like these to include not only the hash
algorithm and bit length, but also the ability to define alternative
identifiers.  For instance, if we goto a 256 identifier I can reasonably
argue that using ECC would be a pretty good idea since the public keys are
currently 160 bits and thus no need to have a 'middle-man' HIT identifier
(ECC usage has IPR implications, which is typically why it is shunned, as
discussed earlier.  Just using it as an example and maybe if we asked
Certicom nicely they'd let HIP use their ECC method for free.  I can think
of a few business reasons why they might do that).

  Another alternative is to use symmetric cyphers (AES, ect.).  Basically,
one can use a random value as a 'hip session identifier' and then encrypt it
using the current session key.  This new step would be part of the protocol
but has pretty drastic implications for LSI use.  This is probably the only
way to minimize the bits used by an identifier while maintaining strong
security (hmmm, since both values, the random identifier and a session key
are unknown to an attacker, one should be able to just use a XOR mask, thus
96 bits get you 2^96 security - but there is no persistence across sessions,
like an HIT has).  I imagine this idea was discussed before and that hashed
HIs to generate HITs was decided to be better (always seemed better to me,
but if you really want to minimize packet headers, seems we would need to
use something like this).  I have to think on this.  Maybe it would be
better to leave the IP source addr to it's typically usage and add a 64 or
96 bit session identifier field to HIP headers that is masked by a random
session key?

Greg

----- Original Message ----- 
From: "Julien Laganier" <Julien.Laganier@Sun.COM>
To: <hipsec@honor.trusecure.com>
Cc: "Tim Shepard" <shep@alum.mit.edu>; "Pekka Nikander"
<pekka.nikander@nomadiclab.com>; "Yogesh Prem Swami"
<yogesh.swami@nokia.com>; "Greg Perkins" <gmp@research.panasonic.com>
Sent: Tuesday, March 08, 2005 5:56 PM
Subject: Re: [Hipsec] SHA1 broken?


> On Tuesday 08 March 2005 23:27, Tim Shepard wrote:
>
> <snip>
>
> > Implications for HIP
> > --------------------
> >
> > For HIP I think we need to be able to handle longer HITs, and I
> > think we need a way of encoding in the HIT itself (in an
> > unambiguous way) what hash function it is that is supposed to
> > demonstrate the binding of the HIT to a public key.  (Otherwise, a
> > weakness in one hash function might allow you to create a public
> > key which can be "demonstrated" to be bound to a HIT that was
> > created with a different hash function.)
>
> I concur with this. BTW if you looks at the HIPHI DNS RR format, it
> already encodes both the HIT algorithm and size.
>
> Also, I am wondering to what extent we might also want to include in
> the HI itself the algorithm used to verify it (e.g. RSA), like Tim's
> proposal for HITs, instead of just signalling this algorithm in the
> HOST_ID TLV.
>
> Or perhaps just say that the HI is the whole HOST_ID TLV...
>
> What does the WG think?
>
> --julien
>


From miika@iki.fi  Tue Mar 15 03:12:00 2005
From: miika@iki.fi (Miika Komu)
Date: Tue Mar 15 03:12:00 2005
Subject: [Hipsec] about interops and the use of asymmetric algorithms
Message-ID: <Pine.GSO.4.58.0503150914480.9819@kekkonen.cs.hut.fi>

We organized interops during IETF62 at Minneapolis with InfraHIP, Boeing
and Ericsson implementations. We tested some "new"  features, like RSA and
AES support in the base exchange. We also tested the UPDATE procotol. The
base exchange interop tests were successful and UPDATE interops were less
successful (due to the excessive number of the ways the UPDATE can be
used). We have communicated some implementation related nits directly to
Petri, and hope that they will be applied if seem fit.

There was one interesting thing that perhaps is worth mentioning on the
mailing list. We successfully interoperated a base exchange where one end
was using DSA and the other was using RSA. It works if both ends are
careful in the selection of the source host id to be used for outgoing
packets.

Basically, the I1 packet fixes the initiator and responder host ids to be
used in the rest of the communication in the non-opportunistic mode. Doing
otherwise resulted in problems in the interops. I suggest mentioning this
explicitly in the draft.

Also, I suggest a small addition in section 6.2.17 (NOTIFY) for future
extensions that define new host id algorithms. There should be a specific
NOTIFY message type for signalling that a specific host id algorithm is
not supported for a host. Or perhaps the AUTHENTICATION_FAILED suffices
for this?

-- 
Miika Komu              miika@iki.fi          http://www.iki.fi/miika/

From shep@alum.mit.edu  Thu Mar 17 11:24:00 2005
From: shep@alum.mit.edu (Tim Shepard)
Date: Thu Mar 17 11:24:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
Message-ID: <E1DBxmW-0006pb-00@alva.home>

I said and have been been quoted as saying:

> > > Implications for HIP
> > > --------------------
> > >
> > > For HIP I think we need to be able to handle longer HITs, and I
> > > think we need a way of encoding in the HIT itself (in an
> > > unambiguous way) what hash function it is that is supposed to
> > > demonstrate the binding of the HIT to a public key.  (Otherwise, a
> > > weakness in one hash function might allow you to create a public
> > > key which can be "demonstrated" to be bound to a HIT that was
> > > created with a different hash function.)

After discussing this with a number of people at IETF62 who are
more of a cryptographer than I am, I am now not certain that we
need to make HITs any longer than they are now.  It may be
reasonable to have only around 120 bits of hash function output
incorporated into the HIT.

If that is secure enough, there may be significant advantages to
keeping HITs at a fixed length of 128 bits.

My understanding now is that 80 bits of good hash function output is
sufficient today, and with a simpleminded extrapolation of needing
another bit every 18 months (for Moore's law), 120-bits of good hash
function output should be good until around the year 2065.  So
perhaps we can save extending the HIT to be greater than 128 bits
for some future rev of the relevant protocols.  (Or are we trying to
design protocols that will last for a 100 years or more?)

I do however still believe that we need an unambiguous tag in the
HIT that tells you how it was generated (which hash function was
used, and perhaps how it was used).  IMHO we need at least four
bits of such a tag, and preferably a few more than that.

And there's also the desire some have to squeeze HITs into the
IPv6 unicast address space somewhere so that they can be passed
across IPv6 related APIs, so that may burn a few top bits of
the HIT.

			-Tim Shepard
			 shep@alum.mit.edu

From gmp@research.panasonic.com  Thu Mar 17 13:55:00 2005
From: gmp@research.panasonic.com (Greg Perkins)
Date: Thu Mar 17 13:55:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
References: <E1DBxmW-0006pb-00@alva.home>
Message-ID: <01c501c52b24$ff6f52f0$ef01a996@gmp>

I mostly agree with this but there may be an issue with long-term HI/HIT
use.  I like the idea of having a long-term HI, one I can hand-out because
it will last years.  In such a use-case it would be a pain if someone
managed to duplicate my HIT and thus I'd be forced to make a new HI/HIT and
hand it out all over again.  I don't consider this critical but it would be
nice if a HI could last for a long period of time IMO.

Also, I have started to consider whether or not it is a good idea to use an
HIT in the HIP exchange/control packets.  The use of a random HIP session
identifier (around 64-96 bits in length) might work out better.  During the
base exchange you'd have to send your HI in the I2 packet.  The R2 packet
would contain a session key to be used to mask your HIP session identifier.
The SPI index is then used to decrypt the encrypted HIP session indentifier,
that is included in every HIP packet header.  The HIP session identifier
(HSI) can then be used as the pointer to the HI and also as an index for
applications.  I am still mulling this over, and am really just being a
devil's advocate atm because I like HITs because of their cryptographic link
to the HI.  But, a HSI has the following benefits:

- an HSI is a temporary value so even if an attacker attains one he can only
do harm to the current HIP session
- fewer bits needed for identifier.  64 bits would be more than enough
because the value is session oriented and thus discarded after use.
Therefore, we could use 64 bits of the IPv6 source address space for an HSI
and use the other 64 bits for other uses like LSIs.
- using an XOR mask is a cheap yet strong method for protecting the HSI.
- for legacy applications you could probably make the HSI an IP address,
though I don't know how HIP could be signaled so that it does this in an
appropriate way (security gets thrown away of course)

In this scenario a HIT is used mainly for lookup at the DNS (or wherever)
and thus can use 128 or 256 bit hash as needed.

I now await a counter-argument in support of HITs.  The crypto-graphic link
to an HI is the strong-point IMO but with hashes under heavy attack, such a
link may not be all that secure.  Thus, we either need more bits, live with
less security or maybe use a different identifier.

Greg

----- Original Message ----- 
From: "Tim Shepard" <shep@alum.mit.edu>
To: <hipsec@honor.trusecure.com>
Sent: Thursday, March 17, 2005 11:23 AM
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )


>
> I said and have been been quoted as saying:
>
> > > > Implications for HIP
> > > > --------------------
> > > >
> > > > For HIP I think we need to be able to handle longer HITs, and I
> > > > think we need a way of encoding in the HIT itself (in an
> > > > unambiguous way) what hash function it is that is supposed to
> > > > demonstrate the binding of the HIT to a public key.  (Otherwise, a
> > > > weakness in one hash function might allow you to create a public
> > > > key which can be "demonstrated" to be bound to a HIT that was
> > > > created with a different hash function.)
>
> After discussing this with a number of people at IETF62 who are
> more of a cryptographer than I am, I am now not certain that we
> need to make HITs any longer than they are now.  It may be
> reasonable to have only around 120 bits of hash function output
> incorporated into the HIT.
>
> If that is secure enough, there may be significant advantages to
> keeping HITs at a fixed length of 128 bits.
>
> My understanding now is that 80 bits of good hash function output is
> sufficient today, and with a simpleminded extrapolation of needing
> another bit every 18 months (for Moore's law), 120-bits of good hash
> function output should be good until around the year 2065.  So
> perhaps we can save extending the HIT to be greater than 128 bits
> for some future rev of the relevant protocols.  (Or are we trying to
> design protocols that will last for a 100 years or more?)
>
> I do however still believe that we need an unambiguous tag in the
> HIT that tells you how it was generated (which hash function was
> used, and perhaps how it was used).  IMHO we need at least four
> bits of such a tag, and preferably a few more than that.
>
> And there's also the desire some have to squeeze HITs into the
> IPv6 unicast address space somewhere so that they can be passed
> across IPv6 related APIs, so that may burn a few top bits of
> the HIT.
>
> -Tim Shepard
> shep@alum.mit.edu
> _______________________________________________
> Hipsec mailing list
> Hipsec@honor.trusecure.com
> http://honor.trusecure.com/mailman/listinfo/hipsec
>


From tkoponen@iki.fi  Thu Mar 17 16:46:02 2005
From: tkoponen@iki.fi (Teemu Koponen)
Date: Thu Mar 17 16:46:02 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <01c501c52b24$ff6f52f0$ef01a996@gmp>
References: <E1DBxmW-0006pb-00@alva.home> <01c501c52b24$ff6f52f0$ef01a996@gmp>
Message-ID: <20050317214550.GA4303@iki.fi>

On Thu, Mar 17, 2005 at 02:10:35PM -0500, Greg Perkins wrote:

> that is included in every HIP packet header.  The HIP session
> identifier (HSI) can then be used as the pointer to the HI and also
> as an index for applications.  I am still mulling this over, and am
> really just being a devil's advocate atm because I like HITs because
> of their cryptographic link to the HI.  But, a HSI has the following
> benefits:

If I understood correctly, session identifiers, and their connection
to host identities, were known to peers only in your model.  However,
there might be (HIP-aware) middle-boxes in the path that could use an
index to host identities too. For them peer-only HI pointers create
challenges.

Teemu

--
tkoponen@iki.fi # PGP, X.509v3: http://www.iki.fi/tkoponen/px.html
PGP fingerprint: 98D9 FD4D 7E63 11A4 074A 0D51 FFAA 007D C8D4 BD4C
X.509v3        : D854 0273 366F 53D1 BB35 C2B1 F534 8EC8 91B6 A9AD



From pekka.nikander@nomadiclab.com  Fri Mar 18 05:23:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Fri Mar 18 05:23:01 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <00fb01c528b8$488de740$ef01a996@gmp>
References: <E1D8nAp-0000w9-00@alva.home>  <200503082356.53783.julien.laganier@sun.com> <00fb01c528b8$488de740$ef01a996@gmp>
Message-ID: <2a13381e827c10e9a1e6d7d855331e5a@nomadiclab.com>

Greg,

> If you add a check that the RSA public key (the HI) must be of at 
> least a
> certain length then this attack stays very difficult because key 
> generation
> is a O(n^4) operation.

It is desirable to allow short host identity public keys for various
reasons.  Hence, IMHO we can't rely (much) on the fact that public
key generation is a hard operation.  Additionally, it may well happen
that some HITs in the future would be hashes of something else but
just a public key; e.g., consider HITs that are hashes over self signed
certificates.

> I do agree that the encoding should include a few semantic bits, like 
> Pekka
> discussed at the meeting.  I'd like these to include not only the hash
> algorithm and bit length, but also the ability to define alternative
> identifiers.

Well, I disagree.  IMHO we should keep the HITs themselves as 
semantic-free
as possible.  The hash algorithm we have to encode there, but IMHO we 
should
not encode the type.

We've gone through this type-encoding discussion before (I'm off-line so
I can't check the archive), and then the conclusion was to move from
type-tagged identifiers into pure hashes.  I don't remember the details
of that discussion any more, though.  What I remember is the following:

  - Any information in the HIT is a potential privacy issue.  The HITs,
    even temporary ones, will often be visible to external parties.
    They should be able to learn as little as possible from the HIT 
alone.

  - Many people at the November 2004 Washington DC workshop argued that
    the HITs should have even less semantic information; i.e., it should
    be possible to have HITs that are not considered to be hashes of
    public keys.  Unfortunately, that collides with the implicit channel
    bindings property of HITs.

Other than that, I think that your ideas about ECC and symmetric
keys are interesting and warrant more study.  However, while doing
so, it is good to keep in mind the current design constrains and
competing requirements.

--Pekka


From pekka.nikander@nomadiclab.com  Fri Mar 18 05:23:04 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Fri Mar 18 05:23:04 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <E1DBxmW-0006pb-00@alva.home>
References: <E1DBxmW-0006pb-00@alva.home>
Message-ID: <0dc7934f2b58058408cf6673a8167487@nomadiclab.com>

On Mar 17, 2005, at 11:23, Tim Shepard wrote:
>>>> For HIP I think we need to be able to handle longer HITs, and I
>>>> think we need a way of encoding in the HIT itself (in an
>>>> unambiguous way) what hash function it is that is supposed to
>>>> demonstrate the binding of the HIT to a public key.
>
> After discussing this with a number of people at IETF62 who are
> more of a cryptographer than I am, I am now not certain that we
> need to make HITs any longer than they are now.  It may be
> reasonable to have only around 120 bits of hash function output
> incorporated into the HIT.
>
> If that is secure enough, there may be significant advantages to
> keeping HITs at a fixed length of 128 bits.

I agree.  Tom may have a different opinion, though.

Let me try to put some of my thoughts in more concrete form:

1. It is far easier to handle fixed length entities in hardware
    than variable length ones.  AFAIK, that is one of the main
    reasons why IP has fixed length addresses.  As I can imagine
    one possible future where there is a considerable number of
    SPI-NAT like middle boxes in the network, I consider it highly
    desirable to optimise the HIP header to be suitable for
    hardware-based fast demultiplexing.

2. A software implementation that deals with a fixed length
    length entities is likely to have less bugs and likely to
    be faster than one that is optimised for handling variable
    length entities.

3. It is always possible to embded *shorter* identifiers into
    longer ones, if such need arises.

4. The identifiers must be long enough so that the probability
    of collisions is low enough.  From this point of view 64 bits
    would definitely be too short, and while 128 bits looks likely
    to be long enough, we don't know how many networked devices
    there will be in the future, may be up to 10^15 or 10^16.
    Considering that 2^120 \approx 10^36, there would still be
    about 10^20 identifiers per device.  As long as we impose
    no structure on the identifiers, that should be ok.  However,
    the margin is not that large any more, due to the birthday
    paradox.  Unless my math is completely flawed (which it may
    well be), we might expect to get problems with about
    107..108-bits long identifiers, leaving us with a margin of
    about 12 bits.  In other words, if my upper bound approximation
    of the number of devices (10^16) is off by more than two
    orders of magnitude, we may start having problems.

5. The computational complexity of forging an identifier is
    a different concern, separate from statistical uniqueness.
    Tim described it well:

> My understanding now is that 80 bits of good hash function output is
> sufficient today, and with a simpleminded extrapolation of needing
> another bit every 18 months (for Moore's law), 120-bits of good hash
> function output should be good until around the year 2065.  So
> perhaps we can save extending the HIT to be greater than 128 bits
> for some future rev of the relevant protocols.

So, due to the reasons above, I think that it looks like a good
idea to stick with fixed length identifiers and at least 120-bit
hashes for now.  That we can fairly easily fit into 128-bit
identifiers.  However, I would prefer to keep more bits for the
hash, just to decrease the probability of us getting later in trouble
due to a considerable number devices starting to have the same HIT
by chance.

> (Or are we trying to design protocols that will last for a
> 100 years or more?)

I would say that we should design our protocols so that they are
likely to remain usable for at least 50 years, and preferably
longer.  Hence, we should engineer in a way to extend the length
due to increased computing power in the future.  However, that
can well be a protocol version bump, IMHO.

> I do however still believe that we need an unambiguous tag in the
> HIT that tells you how it was generated (which hash function was
> used, and perhaps how it was used).  IMHO we need at least four
> bits of such a tag, and preferably a few more than that.

I fully agree with the need for a tag.  It must also be understood
that the tag is a fundamental part of the identifier and cannot
be removed or changed without making the identifier a different one.

What comes to the tag length, we have here two competing forces:

   - Flexibility offered by a longer tag length
   - Smaller probability of collisions due to a longer hash length

> And there's also the desire some have to squeeze HITs into the
> IPv6 unicast address space somewhere so that they can be passed
> across IPv6 related APIs, so that may burn a few top bits of
> the HIT.

With careful co-ordination we can most probably take care of
both the tag and the IPv6 value space considerations, at least
initially.

--Pekka


From shep@alum.mit.edu  Mon Mar 21 00:12:01 2005
From: shep@alum.mit.edu (Tim Shepard)
Date: Mon Mar 21 00:12:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: Your message of Thu, 17 Mar 2005 15:40:14 -0500.
 <0dc7934f2b58058408cf6673a8167487@nomadiclab.com>
Message-ID: <E1DDFCO-00015d-00@alva.home>

> > I do however still believe that we need an unambiguous tag in the
> > HIT that tells you how it was generated (which hash function was
> > used, and perhaps how it was used).  IMHO we need at least four
> > bits of such a tag, and preferably a few more than that.
> 
> I fully agree with the need for a tag.  It must also be understood
> that the tag is a fundamental part of the identifier and cannot
> be removed or changed without making the identifier a different one.
> 
> What comes to the tag length, we have here two competing forces:
> 
>    - Flexibility offered by a longer tag length
>    - Smaller probability of collisions due to a longer hash length

The difference between 120 bits of hash and 124 bits of hash value
seems barely significant.

The difference between 4 bits of tag and 8 bits of tag seems very
significant.

So it seems to me that the 128-bit format for a HIT should be 8 bits
of tag, followed by 120 bits of hash value.


(Perhaps we could use (or reserve) one bit in the tag byte to indicate
 whether the HIT is 128 bits or 256 bits long.  Or have the
 code-points in the tag byte gain an implied length of the HIT when
 the code points are assigned.)

			-Tim Shepard
			 shep@alum.mit.edu

From pekka.nikander@nomadiclab.com  Mon Mar 21 05:29:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Mon Mar 21 05:29:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <E1DDFCO-00015d-00@alva.home>
References: <E1DDFCO-00015d-00@alva.home>
Message-ID: <fa1de6094c713284117b8bee32d23327@nomadiclab.com>

>>> I do however still believe that we need an unambiguous tag in the
>>> HIT that tells you how it was generated (which hash function was
>>> used, and perhaps how it was used).  IMHO we need at least four
>>> bits of such a tag, and preferably a few more than that.
>>
>> I fully agree with the need for a tag.  It must also be understood
>> that the tag is a fundamental part of the identifier and cannot
>> be removed or changed without making the identifier a different one.
>>
>> What comes to the tag length, we have here two competing forces:
>>
>>    - Flexibility offered by a longer tag length
>>    - Smaller probability of collisions due to a longer hash length
>
> The difference between 120 bits of hash and 124 bits of hash value
> seems barely significant.
>
> The difference between 4 bits of tag and 8 bits of tag seems very
> significant.

I still have my doubts whether this is good for the architecture.
I have the strong feeling that 8 bits is too much for encoding
the hash function; in fact, something like 3 bits should do very
well.  On the other hand, I can live with having 3 or 4 bits for the
tag, 5 or 4 bits reserved, and 120 bits for the hash value.

Hence, I would suggest the following:

   0      5    7                                              127
   +------+----+------------------------------------------------+
   | Prfx | HA | Hash                                           |
   +------+----+------------------------------------------------+

    Prfx (5 bits) - Fixed prefix, TBD.  All other values reserved.

         Suggested prefix for testing: 01000

    HA (3 bits) - Hash algorithm.

       000 - SHA-1  (as currently defined)
             All other values reserved.

    Hash (120 bits) - Hash (as specified by HA) of the public key.

Comments?

--Pekka


From hipsec-rg@honor.trusecure.com  Mon Mar 21 08:26:03 2005
From: hipsec-rg@honor.trusecure.com (Pekka Nikander)
Date: Mon Mar 21 08:26:03 2005
Subject: [Hipsec] Session identifiers (was Re: sticking with 128-bit HITs)
In-Reply-To: <01c501c52b24$ff6f52f0$ef01a996@gmp>
References: <E1DBxmW-0006pb-00@alva.home> <01c501c52b24$ff6f52f0$ef01a996@gmp>
Message-ID: <338a8312a5298b0b8a4a27a61f7d3fb8@nomadiclab.com>

Greg,

The ideas you have sound interesting and worth investigating,
but I'm afraid they fall beyond the current WG charter.  Hence,
maybe this discussion should be moved to the RG side?

In general, I think it would be a good idea if people worked
out on alternatives to the current HIP protocol.  The questions
about Service and Session identifiers are important, and IMHO
not well enough thought out in the current HIP architecture.

--Pekka

On Mar 17, 2005, at 21:10, Greg Perkins wrote:

> I mostly agree with this but there may be an issue with long-term 
> HI/HIT
> use.  I like the idea of having a long-term HI, one I can hand-out 
> because
> it will last years.  In such a use-case it would be a pain if someone
> managed to duplicate my HIT and thus I'd be forced to make a new 
> HI/HIT and
> hand it out all over again.  I don't consider this critical but it 
> would be
> nice if a HI could last for a long period of time IMO.
>
> Also, I have started to consider whether or not it is a good idea to 
> use an
> HIT in the HIP exchange/control packets.  The use of a random HIP 
> session
> identifier (around 64-96 bits in length) might work out better.  
> During the
> base exchange you'd have to send your HI in the I2 packet.  The R2 
> packet
> would contain a session key to be used to mask your HIP session 
> identifier.
> The SPI index is then used to decrypt the encrypted HIP session 
> indentifier,
> that is included in every HIP packet header.  The HIP session 
> identifier
> (HSI) can then be used as the pointer to the HI and also as an index 
> for
> applications.  I am still mulling this over, and am really just being a
> devil's advocate atm because I like HITs because of their 
> cryptographic link
> to the HI.  But, a HSI has the following benefits:
>
> - an HSI is a temporary value so even if an attacker attains one he 
> can only
> do harm to the current HIP session
> - fewer bits needed for identifier.  64 bits would be more than enough
> because the value is session oriented and thus discarded after use.
> Therefore, we could use 64 bits of the IPv6 source address space for 
> an HSI
> and use the other 64 bits for other uses like LSIs.
> - using an XOR mask is a cheap yet strong method for protecting the 
> HSI.
> - for legacy applications you could probably make the HSI an IP 
> address,
> though I don't know how HIP could be signaled so that it does this in 
> an
> appropriate way (security gets thrown away of course)
>
> In this scenario a HIT is used mainly for lookup at the DNS (or 
> wherever)
> and thus can use 128 or 256 bit hash as needed.
>
> I now await a counter-argument in support of HITs.  The crypto-graphic 
> link
> to an HI is the strong-point IMO but with hashes under heavy attack, 
> such a
> link may not be all that secure.  Thus, we either need more bits, live 
> with
> less security or maybe use a different identifier.
>
> Greg
>
> ----- Original Message -----
> From: "Tim Shepard" <shep@alum.mit.edu>
> To: <hipsec@honor.trusecure.com>
> Sent: Thursday, March 17, 2005 11:23 AM
> Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
>
>
>>
>> I said and have been been quoted as saying:
>>
>>>>> Implications for HIP
>>>>> --------------------
>>>>>
>>>>> For HIP I think we need to be able to handle longer HITs, and I
>>>>> think we need a way of encoding in the HIT itself (in an
>>>>> unambiguous way) what hash function it is that is supposed to
>>>>> demonstrate the binding of the HIT to a public key.  (Otherwise, a
>>>>> weakness in one hash function might allow you to create a public
>>>>> key which can be "demonstrated" to be bound to a HIT that was
>>>>> created with a different hash function.)
>>
>> After discussing this with a number of people at IETF62 who are
>> more of a cryptographer than I am, I am now not certain that we
>> need to make HITs any longer than they are now.  It may be
>> reasonable to have only around 120 bits of hash function output
>> incorporated into the HIT.
>>
>> If that is secure enough, there may be significant advantages to
>> keeping HITs at a fixed length of 128 bits.
>>
>> My understanding now is that 80 bits of good hash function output is
>> sufficient today, and with a simpleminded extrapolation of needing
>> another bit every 18 months (for Moore's law), 120-bits of good hash
>> function output should be good until around the year 2065.  So
>> perhaps we can save extending the HIT to be greater than 128 bits
>> for some future rev of the relevant protocols.  (Or are we trying to
>> design protocols that will last for a 100 years or more?)
>>
>> I do however still believe that we need an unambiguous tag in the
>> HIT that tells you how it was generated (which hash function was
>> used, and perhaps how it was used).  IMHO we need at least four
>> bits of such a tag, and preferably a few more than that.
>>
>> And there's also the desire some have to squeeze HITs into the
>> IPv6 unicast address space somewhere so that they can be passed
>> across IPv6 related APIs, so that may burn a few top bits of
>> the HIT.
>>
>> -Tim Shepard
>> shep@alum.mit.edu
>> _______________________________________________
>> Hipsec mailing list
>> Hipsec@honor.trusecure.com
>> http://honor.trusecure.com/mailman/listinfo/hipsec
>>
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@honor.trusecure.com
> http://honor.trusecure.com/mailman/listinfo/hipsec
>


From gmp@research.panasonic.com  Mon Mar 21 13:21:03 2005
From: gmp@research.panasonic.com (Greg Perkins)
Date: Mon Mar 21 13:21:03 2005
Subject: [Hipsec] Session identifiers (was Re: sticking with 128-bit
 HITs)
References: <E1DBxmW-0006pb-00@alva.home>
 <01c501c52b24$ff6f52f0$ef01a996@gmp>
 <338a8312a5298b0b8a4a27a61f7d3fb8@nomadiclab.com>
Message-ID: <025201c52e44$e02f0980$ef01a996@gmp>

Pekka,

You are correct.  These belong on HIP-RG.  I'll continue any email discusion
on this there.

Greg


----- Original Message ----- 
From: "Pekka Nikander" <pekka.nikander@nomadiclab.com>
To: "Greg Perkins" <gmp@research.panasonic.com>
Cc: <hipsec-rg@honor.trusecure.com>; <hipsec@honor.trusecure.com>
Sent: Monday, March 21, 2005 8:25 AM
Subject: [Hipsec] Session identifiers (was Re: sticking with 128-bit HITs)


> Greg,
>
> The ideas you have sound interesting and worth investigating,
> but I'm afraid they fall beyond the current WG charter.  Hence,
> maybe this discussion should be moved to the RG side?
>
> In general, I think it would be a good idea if people worked
> out on alternatives to the current HIP protocol.  The questions
> about Service and Session identifiers are important, and IMHO
> not well enough thought out in the current HIP architecture.
>
> --Pekka
>
> On Mar 17, 2005, at 21:10, Greg Perkins wrote:
>
> > I mostly agree with this but there may be an issue with long-term
> > HI/HIT
> > use.  I like the idea of having a long-term HI, one I can hand-out
> > because
> > it will last years.  In such a use-case it would be a pain if someone
> > managed to duplicate my HIT and thus I'd be forced to make a new
> > HI/HIT and
> > hand it out all over again.  I don't consider this critical but it
> > would be
> > nice if a HI could last for a long period of time IMO.
> >
> > Also, I have started to consider whether or not it is a good idea to
> > use an
> > HIT in the HIP exchange/control packets.  The use of a random HIP
> > session
> > identifier (around 64-96 bits in length) might work out better.
> > During the
> > base exchange you'd have to send your HI in the I2 packet.  The R2
> > packet
> > would contain a session key to be used to mask your HIP session
> > identifier.
> > The SPI index is then used to decrypt the encrypted HIP session
> > indentifier,
> > that is included in every HIP packet header.  The HIP session
> > identifier
> > (HSI) can then be used as the pointer to the HI and also as an index
> > for
> > applications.  I am still mulling this over, and am really just being a
> > devil's advocate atm because I like HITs because of their
> > cryptographic link
> > to the HI.  But, a HSI has the following benefits:
> >
> > - an HSI is a temporary value so even if an attacker attains one he
> > can only
> > do harm to the current HIP session
> > - fewer bits needed for identifier.  64 bits would be more than enough
> > because the value is session oriented and thus discarded after use.
> > Therefore, we could use 64 bits of the IPv6 source address space for
> > an HSI
> > and use the other 64 bits for other uses like LSIs.
> > - using an XOR mask is a cheap yet strong method for protecting the
> > HSI.
> > - for legacy applications you could probably make the HSI an IP
> > address,
> > though I don't know how HIP could be signaled so that it does this in
> > an
> > appropriate way (security gets thrown away of course)
> >
> > In this scenario a HIT is used mainly for lookup at the DNS (or
> > wherever)
> > and thus can use 128 or 256 bit hash as needed.
> >
> > I now await a counter-argument in support of HITs.  The crypto-graphic
> > link
> > to an HI is the strong-point IMO but with hashes under heavy attack,
> > such a
> > link may not be all that secure.  Thus, we either need more bits, live
> > with
> > less security or maybe use a different identifier.
> >
> > Greg
> >
> > ----- Original Message -----
> > From: "Tim Shepard" <shep@alum.mit.edu>
> > To: <hipsec@honor.trusecure.com>
> > Sent: Thursday, March 17, 2005 11:23 AM
> > Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
> >
> >
> >>
> >> I said and have been been quoted as saying:
> >>
> >>>>> Implications for HIP
> >>>>> --------------------
> >>>>>
> >>>>> For HIP I think we need to be able to handle longer HITs, and I
> >>>>> think we need a way of encoding in the HIT itself (in an
> >>>>> unambiguous way) what hash function it is that is supposed to
> >>>>> demonstrate the binding of the HIT to a public key.  (Otherwise, a
> >>>>> weakness in one hash function might allow you to create a public
> >>>>> key which can be "demonstrated" to be bound to a HIT that was
> >>>>> created with a different hash function.)
> >>
> >> After discussing this with a number of people at IETF62 who are
> >> more of a cryptographer than I am, I am now not certain that we
> >> need to make HITs any longer than they are now.  It may be
> >> reasonable to have only around 120 bits of hash function output
> >> incorporated into the HIT.
> >>
> >> If that is secure enough, there may be significant advantages to
> >> keeping HITs at a fixed length of 128 bits.
> >>
> >> My understanding now is that 80 bits of good hash function output is
> >> sufficient today, and with a simpleminded extrapolation of needing
> >> another bit every 18 months (for Moore's law), 120-bits of good hash
> >> function output should be good until around the year 2065.  So
> >> perhaps we can save extending the HIT to be greater than 128 bits
> >> for some future rev of the relevant protocols.  (Or are we trying to
> >> design protocols that will last for a 100 years or more?)
> >>
> >> I do however still believe that we need an unambiguous tag in the
> >> HIT that tells you how it was generated (which hash function was
> >> used, and perhaps how it was used).  IMHO we need at least four
> >> bits of such a tag, and preferably a few more than that.
> >>
> >> And there's also the desire some have to squeeze HITs into the
> >> IPv6 unicast address space somewhere so that they can be passed
> >> across IPv6 related APIs, so that may burn a few top bits of
> >> the HIT.
> >>
> >> -Tim Shepard
> >> shep@alum.mit.edu
> >> _______________________________________________
> >> Hipsec mailing list
> >> Hipsec@honor.trusecure.com
> >> http://honor.trusecure.com/mailman/listinfo/hipsec
> >>
> >
> > _______________________________________________
> > Hipsec mailing list
> > Hipsec@honor.trusecure.com
> > http://honor.trusecure.com/mailman/listinfo/hipsec
> >
>
> _______________________________________________
> Hipsec mailing list
> Hipsec@honor.trusecure.com
> http://honor.trusecure.com/mailman/listinfo/hipsec
>


From gurtov@cs.helsinki.fi  Tue Mar 22 10:35:01 2005
From: gurtov@cs.helsinki.fi (Andrei Gurtov)
Date: Tue Mar 22 10:35:01 2005
Subject: [Hipsec] legacy NAT traversal
Message-ID: <42403B02.2070001@cs.helsinki.fi>

Hi,

Is anyone currently working on an implementation of legacy NAT traversal 
for HIP using UDP or TCP?
It seems to be a high priority issue, and I'm wondering whether someone 
in InfraHIP project should
do this in case no one is doing it already.

Andrei

From thomas.r.henderson@boeing.com  Tue Mar 22 19:40:01 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Tue Mar 22 19:40:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C04060AB0@xch-nw-27.nw.nos.boeing.com>

 =20
>    0      5    7                                              127
>    +------+----+------------------------------------------------+
>    | Prfx | HA | Hash                                           |
>    +------+----+------------------------------------------------+
>=20
>     Prfx (5 bits) - Fixed prefix, TBD.  All other values reserved.
>=20
>          Suggested prefix for testing: 01000
>=20
>     HA (3 bits) - Hash algorithm.
>=20
>        000 - SHA-1  (as currently defined)
>              All other values reserved.
>=20
>     Hash (120 bits) - Hash (as specified by HA) of the public key.
>=20
> Comments?
>=20

Actually, that is mostly consistent with what I was arguing for.  I
appreciate the reasons for not having arbitrary lengths-- my main
motiviation for suggesting non-128 bit HITs was in case we wanted to use
larger structures like i3 triggers (256 bits) as ULIDs-- but I think it
is fine to leave that possibility for future research.

Tom=20

From Julien.Laganier@Sun.COM  Wed Mar 23 07:42:01 2005
From: Julien.Laganier@Sun.COM (Julien Laganier)
Date: Wed Mar 23 07:42:01 2005
Subject: [Hipsec] Rendezvous and tunneling
Message-ID: <200503231341.18902.julien.laganier@sun.com>

Hi folks,

At the HIP session during the last IETF, I asked wether or not we 
wanted to keep tunneling as an option in the _simple_ Rendezvous 
Extensions. I was proposing to keep only the header rewriting 
features of the RVS, and let the PATH/NAT traversal document handle 
the case of UDP tunneling. 

Furthermore, IMHO ESP tunneling is useless because it requires 
preservation of the source address (with a FROM) anyway, so there's 
no added functionallity/value compared to header rewriting, it is 
just more complex. Furthermore, now that we splitted-out ESP from the 
base spec, it seems consistent to do the same thing w.r.t. simple RVS 
extensions. 

The few people who expressed an opinion at the HIP session seems to 
agree with that proposal.

So I have now three questions before I begin another pass of edition:

1) Should we get rid of I1_TUNNELING mode?

2) Should we get rid of BIDIRECTIONAL mode? If not, what is the usage 
scenario you have in mind?

3) Should we specify that the RVS relays I1 _and_ UPDATES? This is 
required to support double-movement in mobility scenarios.

Thanks.

--julien

From miika@iki.fi  Wed Mar 23 16:43:01 2005
From: miika@iki.fi (Miika Komu)
Date: Wed Mar 23 16:43:01 2005
Subject: [Hipsec] Rendezvous and tunneling
In-Reply-To: <200503231341.18902.julien.laganier@sun.com>
References: <200503231341.18902.julien.laganier@sun.com>
Message-ID: <Pine.GSO.4.58.0503232324310.28430@kekkonen.cs.hut.fi>

On Wed, 23 Mar 2005, Julien Laganier wrote:

> So I have now three questions before I begin another pass of edition:
>
> 1) Should we get rid of I1_TUNNELING mode?

To further simplify the rendezvous, I'd say yes. Unless someone has a good
use case for this.

> 2) Should we get rid of BIDIRECTIONAL mode? If not, what is the usage
> scenario you have in mind?

Seems of little use...

> 3) Should we specify that the RVS relays I1 _and_ UPDATES? This is
> required to support double-movement in mobility scenarios.

Yes.

-- 
Miika Komu              miika@iki.fi          http://www.iki.fi/miika/

From petri.jokela@nomadiclab.com  Thu Mar 24 00:36:00 2005
From: petri.jokela@nomadiclab.com (Petri Jokela)
Date: Thu Mar 24 00:36:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <6938661A6EDA8A4EA8D1419BCE46F24C04060AB0@xch-nw-27.nw.nos.boeing.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C04060AB0@xch-nw-27.nw.nos.boeing.com>
Message-ID: <42425199.9030005@nomadiclab.com>

Henderson, Thomas R wrote:
>   
> 
>>   0      5    7                                              127
>>   +------+----+------------------------------------------------+
>>   | Prfx | HA | Hash                                           |
>>   +------+----+------------------------------------------------+
>>
>>    Prfx (5 bits) - Fixed prefix, TBD.  All other values reserved.
>>
>>         Suggested prefix for testing: 01000
>>
>>    HA (3 bits) - Hash algorithm.
>>
>>       000 - SHA-1  (as currently defined)
>>             All other values reserved.
>>
>>    Hash (120 bits) - Hash (as specified by HA) of the public key.
>>
>>Comments?
>>
> 
> 
> Actually, that is mostly consistent with what I was arguing for.  I
> appreciate the reasons for not having arbitrary lengths-- my main
> motiviation for suggesting non-128 bit HITs was in case we wanted to use
> larger structures like i3 triggers (256 bits) as ULIDs-- but I think it
> is fine to leave that possibility for future research.

If there are no objections, I will put this kind of a HIT in the next 
version of the base draft.

A minor change, proposed earlier by Tom: Shall we replace the name "HIT" 
with "ULID" to make the identifier more generic or stick with the "HIT"? 
I would like to stay with the "HIT" and use the "ULID" in the future 
versions of HIP.

/petri

-- 
Petri Jokela                        Tel:    +358 9 299 2413
Research scientist                  Fax:    +358 9 299 3535
NomadicLab, Ericsson Research       Mobile: +358 44 299 2413
Oy L M Ericsson Ab                  email: petri.jokela@ericsson.com

From Julien.Laganier@Sun.COM  Thu Mar 24 04:41:01 2005
From: Julien.Laganier@Sun.COM (Julien Laganier)
Date: Thu Mar 24 04:41:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <42425199.9030005@nomadiclab.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C04060AB0@xch-nw-27.nw.nos.boeing.com>
 <42425199.9030005@nomadiclab.com>
Message-ID: <200503241040.07029.julien.laganier@sun.com>

On Thursday 24 March 2005 06:35, Petri Jokela wrote:
> >>   0      5    7                                              127
> >>   +------+----+------------------------------------------------+
> >>
> >>   | Prfx | HA | Hash                                           |
> >>
> >>   +------+----+------------------------------------------------+
> >>

(...)

> If there are no objections, I will put this kind of a HIT in the
> next version of the base draft.

I'm fine with the new HIT format.

> A minor change, proposed earlier by Tom: Shall we replace the name
> "HIT" with "ULID" to make the identifier more generic or stick with
> the "HIT"? I would like to stay with the "HIT" and use the "ULID"
> in the future versions of HIP.

Well, my understanding is that although a HIT is a kind of ULID, it 
encompasses a far more broader scope than a typical ULID. For example 
it has a channel binding property (w.r.t. the associated HI), it is 
mostly derived from a flat/unstructured bitstring (at least for Type 
1 HITs, and in the sense that they are not routable).

Hence, I would rather suggest that we add some text explaining that a 
HIT is a kind of ULID, along with some other (rather nice) 
properties.

Thoughts?

--julien

From shep@alum.mit.edu  Thu Mar 24 09:53:00 2005
From: shep@alum.mit.edu (Tim Shepard)
Date: Thu Mar 24 09:53:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: Your message of Mon, 21 Mar 2005 12:28:09 +0200.
 <fa1de6094c713284117b8bee32d23327@nomadiclab.com>
Message-ID: <E1DETgz-0004AJ-00@alva.home>

Pekka said:

> I still have my doubts whether this is good for the architecture.
> I have the strong feeling that 8 bits is too much for encoding
> the hash function; in fact, something like 3 bits should do very
> well.  On the other hand, I can live with having 3 or 4 bits for the
> tag, 5 or 4 bits reserved, and 120 bits for the hash value.
> 
> Hence, I would suggest the following:
> 
>    0      5    7                                              127
>    +------+----+------------------------------------------------+
>    | Prfx | HA | Hash                                           |
>    +------+----+------------------------------------------------+
> 
>     Prfx (5 bits) - Fixed prefix, TBD.  All other values reserved.
> 
>          Suggested prefix for testing: 01000
> 
>     HA (3 bits) - Hash algorithm.
> 
>        000 - SHA-1  (as currently defined)
>              All other values reserved.
> 
>     Hash (120 bits) - Hash (as specified by HA) of the public key.
> 
> Comments?


Do you intend to use the same set of assignments for HA if
you are using a different Prfx?  I would guess not.  It seems
to me any software written will want to dispatch on the value
of the top 8 bits taken as a single field.

So I think it would be better (yet equivalent in effect for now) to
explain this as the top byte being reserved to identify the type of
HIT (the hash algorithm used to produce the bottom 120 bits).  Simply:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |   Htype       |                                               |
   +-+-+-+-+-+-+-+-+                                               +
   |                  Hash (120 bits)                              |
   +                                                               +
   |                                                               |
   +                                                               +
   |                                                               |
   +                                                               +
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Then, we can allocate one or two code points for Htype (holding all others
in reserve) and you can perform whatever hacks you what to embed this
someplace in IPv6 unicast address space (to allow these to be passed
across IPv6 APIs.

   Htype (8 bits):

       01000000 - SHA-1 (as currently defined)
                  All other values reserved.

So I'm agreeing on the pattern of bits for the one code point you've
assigned (and probably the next one too), just suggesting a better (IMHO)
way to document it.

The IANA considerations would then be (if we want to be able to pass
these across IPv6 interfaces) that each Htype allocated takes a /8
chunk out of IPv6 address space.

That may seem to be a lot to ask for (such a large block out
of IPv6 address space).  However, I'm not sure such /8
allocations would need to be allocated to HIP exclusively.
Rather, it would be a handle that can be passed to refer to
that-which-hashes-to-this-value(-using-the-indicated-hash-algorithm).

(I'm thinking of that SIGCOMM'04 paper here.)

So having IANA set aside a /3 or so out of IPv6 address space
for this sort of thing seems reasonable.  (e.g. 4000::/3 ,
within which it could make up to 32 such /8 allocations.  And
if it ever exhausts this /3, it could use the next one.)

I realize I'm touching areas that are research here, but I
think what I've proposed that we do now would be OK and will
allow us to get this right (via some avenue of bit hackery)
when we are smarter later.

			-Tim Shepard
			 shep@alum.mit.edu

From thomas.r.henderson@boeing.com  Thu Mar 24 20:21:01 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Thu Mar 24 20:21:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C04060AC4@xch-nw-27.nw.nos.boeing.com>

=20

> -----Original Message-----
> From: Tim Shepard [mailto:shep@alum.mit.edu]=20
> Sent: Thursday, March 24, 2005 6:52 AM
> To: Pekka Nikander
> Cc: hipsec@honor.trusecure.com
> Subject: Re: sticking with 128-bit HITs (was Re: [Hipsec]=20
> SHA1 broken? )=20

<snip>

> > Hence, I would suggest the following:
> >=20
> >    0      5    7                                              127
> >    +------+----+------------------------------------------------+
> >    | Prfx | HA | Hash                                           |
> >    +------+----+------------------------------------------------+
> >=20
> >     Prfx (5 bits) - Fixed prefix, TBD.  All other values reserved.
> >=20
> >          Suggested prefix for testing: 01000
> >=20
> >     HA (3 bits) - Hash algorithm.
> >=20
> >        000 - SHA-1  (as currently defined)
> >              All other values reserved.
> >=20
> >     Hash (120 bits) - Hash (as specified by HA) of the public key.
>=20
> So I think it would be better (yet equivalent in effect for=20
> now) to explain this as the top byte being reserved to=20
> identify the type of HIT (the hash algorithm used to produce=20
> the bottom 120 bits).  Simply:
>=20
>     0                   1                   2                   3
>     0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>    |   Htype       |                                               |
>    +-+-+-+-+-+-+-+-+                                               +

I would slightly prefer to use Prefix/Htype, if only for keeping the
door open in the future for non-hash identifiers. =20

I'd also like to see that the prefix type defines further the semantics
of the rest of this first byte.  Specifically, if prefix =3D 001, 110, =
or
111, then the HIT may (in some future use) correspond to an IP address,
and there may be no hash algorithm applied.  However, we would not
specify the use of such prefixes in the base spec-- only that they are
reserved.

So maybe, as a slight variant to Pekka's proposal:

    0      3    8                                            127
   +------+----+------------------------------------------------+
   | Prfx | HA | Hash                                           |
   +------+----+------------------------------------------------+

   Prfx (3 bits) - Fixed prefix, TBD.  All other values reserved
        and do not necessarily imply that the subsequent 125 bits
        correspond to Hash Algorithm and Hash subfields.

        Suggested prefix for testing: 010
  =20
   HA (5 bits) - Hash Algorithm.

   00000 - SHA-1  (as currently defined)
           All other values reserved.

   Hash (120 bits) - Hash (as specified by HA) of the public key.


> The IANA considerations would then be (if we want to be able=20
> to pass these across IPv6 interfaces) that each Htype=20
> allocated takes a /8 chunk out of IPv6 address space.
>=20

Do we need IANA to allocate out of the IPv6 space?  These are not IP
addresses.  Or does the fact that we are coding them to distinguish them
from IP addresses make them implicitly IP addresses?  This has always
been murky to me.

Tom

From thomas.r.henderson@boeing.com  Thu Mar 24 20:28:00 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Thu Mar 24 20:28:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C0664907B@xch-nw-27.nw.nos.boeing.com>

=20

> -----Original Message-----
> From: Julien Laganier [mailto:Julien.Laganier@Sun.COM]=20
> Sent: Thursday, March 24, 2005 1:40 AM
> To: hipsec@honor.trusecure.com
> Cc: Petri Jokela; Henderson, Thomas R; Pekka Nikander; Tim Shepard
> Subject: Re: sticking with 128-bit HITs (was Re: [Hipsec]=20
> SHA1 broken? )
>=20
> On Thursday 24 March 2005 06:35, Petri Jokela wrote:
> > >>   0      5    7                                              127
> > >>   +------+----+------------------------------------------------+
> > >>
> > >>   | Prfx | HA | Hash                                           |
> > >>
> > >>   +------+----+------------------------------------------------+
> > >>
>=20
> (...)
>=20
> > If there are no objections, I will put this kind of a HIT=20
> in the next=20
> > version of the base draft.
>=20
> I'm fine with the new HIT format.
>=20
> > A minor change, proposed earlier by Tom: Shall we replace the name=20
> > "HIT" with "ULID" to make the identifier more generic or stick with=20
> > the "HIT"? I would like to stay with the "HIT" and use the "ULID"
> > in the future versions of HIP.
>=20
> Well, my understanding is that although a HIT is a kind of=20
> ULID, it encompasses a far more broader scope than a typical=20
> ULID. For example it has a channel binding property (w.r.t.=20
> the associated HI), it is mostly derived from a=20
> flat/unstructured bitstring (at least for Type
> 1 HITs, and in the sense that they are not routable).
>=20
> Hence, I would rather suggest that we add some text=20
> explaining that a HIT is a kind of ULID, along with some=20
> other (rather nice) properties.
>=20

I would support having some language about the inherent binding
properties of the HIT (perhaps in section 3.1). =20

Regarding whether we should use HIT vs ULID as the term for the HIP
header, I would support keeping with "HIT" term so long as we keep the
design space a little bit open in the future for non-hash-based HITs
(previous email).

Tom

=20

From pekka.nikander@nomadiclab.com  Fri Mar 25 02:07:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Fri Mar 25 02:07:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <6938661A6EDA8A4EA8D1419BCE46F24C0664907B@xch-nw-27.nw.nos.boeing.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C0664907B@xch-nw-27.nw.nos.boeing.com>
Message-ID: <6f0e0d3087413bac3366590d45fd0d94@nomadiclab.com>

>>> A minor change, proposed earlier by Tom: Shall we replace the name
>>> "HIT" with "ULID" to make the identifier more generic or stick with
>>> the "HIT"? I would like to stay with the "HIT" and use the "ULID"
>>> in the future versions of HIP.
>>
>> Well, my understanding is that although a HIT is a kind of
>> ULID, it encompasses a far more broader scope than a typical
>> ULID. For example it has a channel binding property (w.r.t.
>> the associated HI), it is mostly derived from a
>> flat/unstructured bitstring (at least for Type
>> 1 HITs, and in the sense that they are not routable).
>>
>> Hence, I would rather suggest that we add some text
>> explaining that a HIT is a kind of ULID, along with some
>> other (rather nice) properties.
>>
>
> I would support having some language about the inherent binding
> properties of the HIT (perhaps in section 3.1).
>
> Regarding whether we should use HIT vs ULID as the term for the HIP
> header, I would support keeping with "HIT" term so long as we keep the
> design space a little bit open in the future for non-hash-based HITs
> (previous email).

Sounds good to me.  Basically, I would like to keep the WG work
confined within the charter and the 2003 architecture (as defined
in the architecture draft), only doing minor modifications for sake
of added flexibility in the future.

Past track record at the IETF shows that it has been fairly hard
to anticipate when flexibility would be useful and when detrimental.

--Pekka


From pekka.nikander@nomadiclab.com  Fri Mar 25 02:23:00 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Fri Mar 25 02:23:00 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <6938661A6EDA8A4EA8D1419BCE46F24C04060AC4@xch-nw-27.nw.nos.boeing.com>
References: <6938661A6EDA8A4EA8D1419BCE46F24C04060AC4@xch-nw-27.nw.nos.boeing.com>
Message-ID: <36ea1f7d7e9bc19349ce7f41478fc6ae@nomadiclab.com>

>>> Hence, I would suggest the following:
>>>
>>>    0      5    7                                              127
>>>    +------+----+------------------------------------------------+
>>>    | Prfx | HA | Hash                                           |
>>>    +------+----+------------------------------------------------+
>>>
>>
>> So I think it would be better (yet equivalent in effect for
>> now) to explain this as the top byte being reserved to
>> identify the type of HIT (the hash algorithm used to produce
>> the bottom 120 bits).
>
> I would slightly prefer to use Prefix/Htype, if only for keeping the
> door open in the future for non-hash identifiers.

My base rationale for keeping prefix and hash algorithm separate
are the following:

  1. If we end up with more than 2-3 hash algorithms in use, we
     are likely to end up in an interoperability nightmare.

  2. Having an explicit prefix may make it easier to progress
     into standards track and live peacefully with IPv6 in the
     IPv6 legacy API.

> I'd also like to see that the prefix type defines further the semantics
> of the rest of this first byte.  Specifically, if prefix = 001, 110, or
> 111, then the HIT may (in some future use) correspond to an IP address,
> and there may be no hash algorithm applied.  However, we would not
> specify the use of such prefixes in the base spec-- only that they are
> reserved.

I agree with this approach.  Keep the option open, but not define it 
now.

> So maybe, as a slight variant to Pekka's proposal:

Given the rationale above, I can't see any benefit form having
the hash algorithm field longer than three bits.  In fact, I would
make it only two bits (as it was originally), but four choices
may be too little over time; even if we should aim using only
one or at most 2-3 algorithms at any given time, we may need to
go from one to another.

When 8 choices run out, maybe in 30 years or so, we can bump the
protocol number.

On the other hand, I do see benefit from having a longer prefix,
even if a few bits from the prefix later would end up in being
used for some other purpose.  The benefit is, obviously, the more
potentially more peaceful co-existence with native IPv6.

> Do we need IANA to allocate out of the IPv6 space?  These are not IP
> addresses.  Or does the fact that we are coding them to distinguish 
> them
> from IP addresses make them implicitly IP addresses?  This has always
> been murky to me.

They are *not* IPv6 addresses, even though we have certainly played
with the ideas of making them (overlay) routable.  However, having
them live with IPv6 addresses at the IPv6 API is likely to be a
benefit.

--Pekka


From shep@alum.mit.edu  Fri Mar 25 13:02:01 2005
From: shep@alum.mit.edu (Tim Shepard)
Date: Fri Mar 25 13:02:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: Your message of Fri, 25 Mar 2005 09:22:28 +0200.
 <36ea1f7d7e9bc19349ce7f41478fc6ae@nomadiclab.com>
Message-ID: <E1DEt7J-0004vn-00@alva.home>

> > I'd also like to see that the prefix type defines further the semantics
> > of the rest of this first byte.  Specifically, if prefix = 001, 110, or
> > 111, then the HIT may (in some future use) correspond to an IP address,
> > and there may be no hash algorithm applied.  However, we would not
> > specify the use of such prefixes in the base spec-- only that they are
> > reserved.
> 
> I agree with this approach.  Keep the option open, but not define it 
> now.
> 

That describes the essential bit of what I was trying to get at by
proposing we just have a byte with one or two assigned code points.
In Pekka's original proposal, it looked like he was defining two
knobs, which would allow future settings independently.

So if we say this:

   If the prefix is 01000,
   
   then the next 3 bits are the HA.
   
   If the prefix is something other than 01000, then the syntax and
   semantics of the following bits (however many there may be)
   are to be defined by future documents.

that makes me happy.


But I see no real point in nailing down the boundry between the first
five bits and the last three bits of this first byte when all we're
going to do is assign one or two of the 256 possible values of this
byte for now and hold all of the rest in reserve.  Any implementation
that encounters an unrecognized value in the first byte is not going
to be able to do anything meaningful with it, whether or not we make a
distinction between the first 5 bits and the last 3 bits.  (If I'm
wrong in the last sentence, please enlighten me.)


>   1. If we end up with more than 2-3 hash algorithms in use, we
>      are likely to end up in an interoperability nightmare.
> 

I agree with that, but if we're going to have that problem, your not
going to be able to stop it by bitfield engineering.  (Engineers who
would make that mistake would have no trouble finding the extra bits
on the other side of the artificial boundry between your two fields.)

> When 8 choices run out, maybe in 30 years or so, we can bump the
> protocol number.

These HITs may have a life independent of being carried in the header
of any particular protocol.  They may be stored.  So if there's a
protocol number to be bumped, it's going to have to be inside the HIT
itself.

> > Do we need IANA to allocate out of the IPv6 space?  These are not IP
> > addresses.  Or does the fact that we are coding them to distinguish 
> > them
> > from IP addresses make them implicitly IP addresses?  This has always
> > been murky to me.
> 
> They are *not* IPv6 addresses, even though we have certainly played
> with the ideas of making them (overlay) routable.  However, having
> them live with IPv6 addresses at the IPv6 API is likely to be a
> benefit.

They are certainly not Global Unicast IPv6 addresses.  But are they
any less of an address than some of the other odd things that are
currently allocated out of 0000::/4 and f000::/4 ?  

IMHO it would be reasonable to argue that HITs are as much of an IPv6
address as say a multicast address, a link local unicast address, or a
loopback address (none of which are real addresses).

			-Tim Shepard
			 shep@alum.mit.edu

From pekka.nikander@nomadiclab.com  Mon Mar 28 14:13:01 2005
From: pekka.nikander@nomadiclab.com (Pekka Nikander)
Date: Mon Mar 28 14:13:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
In-Reply-To: <E1DEt7J-0004vn-00@alva.home>
References: <E1DEt7J-0004vn-00@alva.home>
Message-ID: <5c6fb0512de042632562a70ca3f366d9@nomadiclab.com>

>>> I'd also like to see that the prefix type defines further the 
>>> semantics
>>> of the rest of this first byte.  Specifically, if prefix = 001, 110, 
>>> or
>>> 111, then the HIT may (in some future use) correspond to an IP 
>>> address,
>>> and there may be no hash algorithm applied.  However, we would not
>>> specify the use of such prefixes in the base spec-- only that they 
>>> are
>>> reserved.
>>
>> I agree with this approach.  Keep the option open, but not define it
>> now.
>
> That describes the essential bit of what I was trying to get at by
> proposing we just have a byte with one or two assigned code points.
> In Pekka's original proposal, it looked like he was defining two
> knobs, which would allow future settings independently.
>
> So if we say this:
>
>    If the prefix is 01000,
>
>    then the next 3 bits are the HA.
>
>    If the prefix is something other than 01000, then the syntax and
>    semantics of the following bits (however many there may be)
>    are to be defined by future documents.
>
> that makes me happy.

I'm happy with that, too.

> But I see no real point in nailing down the boundry between the first
> five bits and the last three bits of this first byte when all we're
> going to do is assign one or two of the 256 possible values of this
> byte for now and hold all of the rest in reserve.  Any implementation
> that encounters an unrecognized value in the first byte is not going
> to be able to do anything meaningful with it, whether or not we make a
> distinction between the first 5 bits and the last 3 bits.  (If I'm
> wrong in the last sentence, please enlighten me.)

If you don't know how to verify the crypto binding between a HIT
and a HI, all you loose is channel bindings.  Operationally, you
can still create the HIP connection etc.  Hence, if you know the
first 5 bits and you know that the next 3 bits encode a hash function
that you have no idea about, you can still use the HIT, just with
(much) lower security level.

The second reason for making them separate is to make it easier to
define a new hash algorithm.  That would only require a WG action
while a new code point at the IPv6 address space may require a much
heavier process.

>>   1. If we end up with more than 2-3 hash algorithms in use, we
>>      are likely to end up in an interoperability nightmare.
>
>> When 8 choices run out, maybe in 30 years or so, we can bump the
>> protocol number.
>
> These HITs may have a life independent of being carried in the header
> of any particular protocol.  They may be stored.  So if there's a
> protocol number to be bumped, it's going to have to be inside the HIT
> itself.

Hmm.  So we want HITs that are usable over 30 years, once their
channel bindings property has become obsolete?  Maybe, yes, maybe.
But as an alternative we can certainly define another 5-bit prefix,
if needed.

Again, this is all about the right balance.  As of now I think we
don't see what the right balance is.  Maybe someone should collect
all the arguments in a longish e-mail or short draft?  (Don't have
time / wits for it right now.)

>> They are *not* IPv6 addresses, even though we have certainly played
>> with the ideas of making them (overlay) routable.  However, having
>> them live with IPv6 addresses at the IPv6 API is likely to be a
>> benefit.
>
> They are certainly not Global Unicast IPv6 addresses.  But are they
> any less of an address than some of the other odd things that are
> currently allocated out of 0000::/4 and f000::/4 ?

I can't say for f000::/4, but for 0000::/4, yes, some of those
are as little IPv6 addresses as HITs are...

--Pekka


From thomas.r.henderson@boeing.com  Mon Mar 28 21:53:01 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Mon Mar 28 21:53:01 2005
Subject: sticking with 128-bit HITs (was Re: [Hipsec] SHA1 broken? )
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C04060ACA@xch-nw-27.nw.nos.boeing.com>

=20

> -----Original Message-----
> From: Pekka Nikander [mailto:pekka.nikander@nomadiclab.com]=20
> Sent: Monday, March 28, 2005 11:13 AM
> To: Tim Shepard
> Cc: Henderson, Thomas R; hipsec@honor.trusecure.com
> Subject: Re: sticking with 128-bit HITs (was Re: [Hipsec]=20
> SHA1 broken? )=20
>=20
> >>> I'd also like to see that the prefix type defines further the=20
> >>> semantics of the rest of this first byte.  Specifically,=20
> if prefix =3D=20
> >>> 001, 110, or 111, then the HIT may (in some future use)=20
> correspond=20
> >>> to an IP address, and there may be no hash algorithm applied. =20
> >>> However, we would not specify the use of such prefixes in=20
> the base=20
> >>> spec-- only that they are reserved.
> >>
> >> I agree with this approach.  Keep the option open, but not=20
> define it=20
> >> now.
> >
> > That describes the essential bit of what I was trying to get at by=20
> > proposing we just have a byte with one or two assigned code points.
> > In Pekka's original proposal, it looked like he was defining two=20
> > knobs, which would allow future settings independently.
> >
> > So if we say this:
> >
> >    If the prefix is 01000,
> >
> >    then the next 3 bits are the HA.
> >
> >    If the prefix is something other than 01000, then the syntax and
> >    semantics of the following bits (however many there may be)
> >    are to be defined by future documents.
> >
> > that makes me happy.
>=20
> I'm happy with that, too.

Can we make it 010, with five bits HA?  That would then allow us to
block out the global unicast space (001) without having to wildcard the
last two bits.  Or is this a concern that this becomes a 1/8 instead of
1/32 IANA allocation (if IANA is involved)?

> >> They are *not* IPv6 addresses, even though we have=20
> certainly played=20
> >> with the ideas of making them (overlay) routable.  However, having=20
> >> them live with IPv6 addresses at the IPv6 API is likely to be a=20
> >> benefit.
> >
> > They are certainly not Global Unicast IPv6 addresses.  But are they=20
> > any less of an address than some of the other odd things that are=20
> > currently allocated out of 0000::/4 and f000::/4 ?
>=20
> I can't say for f000::/4, but for 0000::/4, yes, some of=20
> those are as little IPv6 addresses as HITs are...
>=20

I still question whether we need to have IANA make an allocation out of
the v6 space, at least at this stage of deployment.  But I admittedly
don't have much understanding of the IANA requirements.

Tom

From miika@iki.fi  Wed Mar 30 03:44:01 2005
From: miika@iki.fi (Miika Komu)
Date: Wed Mar 30 03:44:01 2005
Subject: [Hipsec] SHA1 broken?
In-Reply-To: <2a13381e827c10e9a1e6d7d855331e5a@nomadiclab.com>
References: <E1D8nAp-0000w9-00@alva.home>  <200503082356.53783.julien.laganier@sun.com>
 <00fb01c528b8$488de740$ef01a996@gmp> <2a13381e827c10e9a1e6d7d855331e5a@nomadiclab.com>
Message-ID: <Pine.GSO.4.58.0503301142150.10065@kekkonen.cs.hut.fi>

FYI,

        Title           : Attacks on Cryptographic Hashes in Internet
                          Protocols
        Author(s)       : P. Hoffman, B. Schneier
        Filename        : draft-hoffman-hash-attacks-00.txt
        Pages           : 11
        Date            : 2005-3-28

   Recent announcements of better-than-expected collision attacks in
   popular hash algorithms have caused some people to question whether
   common Internet protocols need to be changed, and if so, how.  This
   document summarizes the use of hashes in many IETF protocols,
   discusses how the collision attacks affect and do not affect the
   protocols, shows how to thwart known attacks on digital certificates,
   and discusses future directions for protocol designers.

A URL for this Internet-Draft is:

http://www.ietf.org/internet-drafts/draft-hoffman-hash-attacks-00.txt

-- 
Miika Komu              miika@iki.fi          http://www.iki.fi/miika/

From Julien.Laganier@Sun.COM  Wed Mar 30 13:02:01 2005
From: Julien.Laganier@Sun.COM (Julien Laganier)
Date: Wed Mar 30 13:02:01 2005
Subject: [Hipsec] Rendezvous and tunneling
In-Reply-To: <200503231341.18902.julien.laganier@sun.com>
References: <200503231341.18902.julien.laganier@sun.com>
Message-ID: <200503302001.07602.julien.laganier@sun.com>

Folks,

On Wednesday 23 March 2005 13:41, Julien Laganier wrote:

(...)

> So I have now three questions before I begin another pass of
> edition:
>
> 1) Should we get rid of I1_TUNNELING mode?
>
> 2) Should we get rid of BIDIRECTIONAL mode? If not, what is the
> usage scenario you have in mind?
>
> 3) Should we specify that the RVS relays I1 _and_ UPDATES? This is
> required to support double-movement in mobility scenarios.

So far I only get one answer (from Miika) to the questions above. 
Hence, if nobody objects, I will modify the hip-rvs draft accordingly 
and send it to the list for feedback.

Thanks.

--julien

From thomas.r.henderson@boeing.com  Wed Mar 30 14:09:00 2005
From: thomas.r.henderson@boeing.com (Henderson, Thomas R)
Date: Wed Mar 30 14:09:00 2005
Subject: [Hipsec] Rendezvous and tunneling
Message-ID: <6938661A6EDA8A4EA8D1419BCE46F24C066490B2@xch-nw-27.nw.nos.boeing.com>

=20

> -----Original Message-----
> From: Julien Laganier [mailto:Julien.Laganier@Sun.COM]=20
> Sent: Wednesday, March 30, 2005 10:01 AM
> To: hipsec@honor.trusecure.com
> Subject: Re: [Hipsec] Rendezvous and tunneling
>=20
> Folks,
>=20
> On Wednesday 23 March 2005 13:41, Julien Laganier wrote:
>=20
> (...)
>=20
> > So I have now three questions before I begin another pass of
> > edition:
> >
> > 1) Should we get rid of I1_TUNNELING mode?
> >
> > 2) Should we get rid of BIDIRECTIONAL mode? If not, what is=20
> the usage=20
> > scenario you have in mind?
> >
> > 3) Should we specify that the RVS relays I1 _and_ UPDATES? This is=20
> > required to support double-movement in mobility scenarios.

I am fine with 1 and 2.  As for 3, note that the current mobility draft
does not address the double-jump problem from the client side.
Therefore, if UPDATE inclusion gets hairy (i.e., has DoS issues), then I
would not delay the RVS draft on account of that.  On the other hand, if
it is a simple extension, then it will probably be used by future
mobility drafts.

Tom

