Hi,

On 10/10/2012 10:05 PM, Sasu Tarkoma wrote:
Hi all,

I read the latest HIP architecture draft (4423bis-05) and it looks
very good. Below you will find some observations that I made
when reading the draft.

looks good to me too but I have also some suggestions for improvement. Here's the first batch of comments, I'll send the remaining ones later.

1. Introduction
...
Although the Host Identifiers could be used in many authentication
systems, such as IKEv2 [RFC4306], the presented architecture
introduces a new protocol, called the Host Identity Protocol (HIP),
and a cryptographic exchange, called the HIP base exchange; see also
Section 7.  The HIP protocols provide for limited forms of trust
between systems, enhance mobility, multi-homing and dynamic IP
renumbering, aid in protocol translation / transition, and reduce
certain types of denial-of-service (DoS) attacks.

(The HIP protocols provide -> HIP provides)

based on offline discussions with a few people, I'd suggest adding something like the following:

Back-to-My-Mac [RFC6281] from Apple comes pretty close to the functionality of HIP. Unlike HIP, it is based on non-cryptographic identifiers and is based on a collection of protocols rather than a single one like HIP. As an analogy to UNIX software, Back-to-My-Mac could be considered as command line tools combined using piping. In contrast, HIP takes the approach that the bandwidth and latency of the "pipe", that is the network, is constrained resource, and combines multiple functionalities to a single protocol.

Much has been learned about HIP since [RFC4423] was published.  This
document expands Host Identities beyond use to enable IP connectivity
and security to general interhost secure signalling at any protocol
layer.  The signal may establish a security association between the
hosts, or simply pass information within the channel.

Much has been learned... I would suggest to add an information reference to the experiment report (RFC6538).

2.1. Terms common to other documents

You talk about RSA and DSA, perhaps you could mention also ECC.

3. Background
...
(silicon based people, if you will).  All these components need to be
..

silicon-based people

Secondly, anonymity is not provided in a consistent, trustable manner.

Yes, blind extensions support anonymity but I think the point here should be about confidentiality rather than anonymity.

3.1. A desire for a namespace for computing platforms

* The namespace should fully decouple the internetworking layer from
  the higher layers.  The names should replace all occurrences of IP
  addresses within applications (like in the Transport Control
  Block, TCB).  This may require changes to the current APIs.  In
  the long run, it is probable that some new APIs are needed.

I would suggest to replace the last two sentences with the following:

While HIP is compatible with legacy applications [RFC5338], developers trying to harness to full benefits of HIP should employ APIs for HIP-aware applications [RFC6317].

(Both references should be informative)

* Sometimes the names may contain a delegation component.  This
 is the cost of resolvability.

Please elaborate, this is too vague. Are referring to the referral issues, please see section 4.2 in RFC6538. Or process migration and delegation?

4. Host Identity namespace
..
However, in the authors'
opinion, a public key of a 'public key pair' makes the best Host
Identifier.

Suggest replacing with:

In the HIP architecture, the public key of a private-public key pair has been chosen as the Host Identifier because it can be self managed and computationally difficult to forge.

There is on-going research in challenge puzzles to use
non-cryptographic HI, like RFIDs, in an HIP exchange
tailored to the workings of such challenges.

is on-going -> has been past (should you reference to rfid draft?)

The actual Host Identifiers are never directly used in any Internet
protocols

At least, not intentionally (referral issues). Or what you mean by "Internet protocols"?

4.2. Host Identity Hash (HIH)

where does intermediary term "HIH" comes from? I think it's not necessary (is it in the other RFCs?)

The Host Identity Hash is the cryptographic hash used in producing
the HIT from the HI.

hash -> hash algorithm

It is possible to for the two hosts in the HIP exchange to use
different hashes.

hashes -> hash algorithms

4.3. Host Identity Tag (HIT)
..
There can be multiple HITs per Host Identifier when multiple hashes
are supported.  An Initator may have to initially guess which HIT to
use for the Responder, typically based on what it prefers, until it
learns the appropriate HIT through the HIP exchange.

Isn't this information directly in the OGA bits?

4.4. Local Scope Identifier (LSI)

I would add in the end of the last paragraph that "LSIs make it possible for an IPv4-based application to communicate with an IPv6-based application".

4.5. Storing Host Identifiers in Directories

Alternatively, or in addition to storing Host Identifiers in the DNS,
they may be stored in various other directories (e.g.  LDAP, DHT) or
in a Public Key Infrastructure (PKI)

Please add an informational reference to RFC6537 just after the DHT.

5.1. Transport associations and end-points
..
It is possible that a single physical computer hosts several logical
end-points.  With HIP, each of these end-points would have a distinct
Host Identity.  Furthermore, since the transport associations are
bound to Host Identities, HIP provides for process migration and
clustered servers.  That is, if a Host Identity is moved from one
physical computer to another, it is also possible to simultaneously
move all the transport associations without breaking them.
Similarly, if it is possible to distribute the processing of a single
Host Identity over several physical computers, HIP provides for
cluster based services without any changes at the client end-point.

I think there was also some other comments about this. This text is not in good shape and it needs to written. It mixes two separate topics into a single paragraph:

* Distributing HI processing - sounds like a nice research idea but it's badly explained and lacks a reference. I'd suggest removing. * Process migration is way more complicated than the text implies (suggest removing).

Btw, the best reference for HIP-based process migration with delegation is this:

S. Herborn, A. Huber, R. Boreli, and A. Seneviratne. Secure host identity delegation for mobility. In COMSWARE. IEEE, 2007.

(Talking about clusters and process migration is a bit old fashioned since nowadays as cloud computing and VM migration are more fashionable :)

6. End-host mobility and multi-homing
..
However, as discussed in
Section 6.2 below, a mobile node must send a HIP readdress packet to
inform the peer of the new address(es), and the peer must verify that
the mobile node is reachable through these addresses.

readdress -> UPDATE

Remaining comments later!

P.S. Please add also "Aalto University" and "RWTH Aachen" to the acknowledgement list, thanks!
_______________________________________________
Hipsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/hipsec

Reply via email to