Hi, Joe,

On Sat, Dec 11, 2010 at 6:45 PM, Joe Touch <to...@isi.edu> wrote:
>> Any of these statistics publicly available?
>
> We had some SSL accellerators that have published statistics; you should be
> able to find that on-line for modern products.

A bit of googling seems to indicate that SSL accelerators can handle
a few thousand connections per second, and are a factor of 2 to 4 times
faster than doing it in software on the main CPU.

But, this bit of data doesn't really tell us much, if we are worried about
the new load imposed by adding secure key derivation to what was
previously a non-security-related middlebox, which I think is what
you were questioning.  But that's really an apples and oranges comparison.

>> Do you really think all of these connections would be
>> from unique names that you don't have LTSS in cache for?
>
> For a device near Google, probably not, but for one near Akamai, I would
> guess probably. Those stats will be harder to come by...

Indeed.

>> The nice thing about using DNS to do key distribution is that all this
>> would be set up automatically.  But you're right, the administrative
>> security policies would need to mesh up.
>
> Using the DNS to do key distribution does NOT mean automatic; it means you
> have an existing infrastructure that requires configuration. Configuration
> is the most challenging part, far as I've heard, of good key distribution.

Sure, you've got to generate public/private key pairs and publish the
public portion at the right place in DNS.  You've got to make sure that
the records are properly DNSSEC signed.  But this is an O(N) operation,
and once it's done, key distribution between any pair of boxes will happen
without intervention.

>> The benefit of public key is that it makes the distribution of the key
>> material
>> much easier.  You don't have to use sneakernet or have another,
>> key-wrapping
>> key defined to push the symmetric key around the network where it might
>> be vulnerable to being intercepted.  Secret keys should stay in the place
>> where they are generated.
>
> There are ways to derive symmetric keys from asymmetric ones, though. The
> point is to not confuse required/desired properties of the primary keys that
> you need to deploy with the keys used to authenticate the traffic.

Diffie-Hellman is just such a derivation mechanism.  The use of public
key cryptography for the primary keys that are published in DNS means
we can avoid an O(N^2) blowup in the manual configuration of symmetric
keys that need to be unique between every pair of communicating entities.

>> I'm not aware of any HMAC algorithms that work that way.  The typical
>> way this is done is to use public key to distribute a shared symmetric
>> secret and then use that in an ordinary symmetric HMAC.
>
> If you're doing that, your HMAC-side is squarely in TCP-AO territory.

Yes it is very similar, but doesn't cover the IP or transport headers.
I thought draft-touch-tcp-ao-nat-01.txt was a good idea.  Has it been
decided not to pursue it?

> The
> rest is a key distribution issue - which, for AO, is out of band, but that
> just means it's NOT in the AO portion. There's a bootstrapping issue if you
> include it in the TCP header, but you have that regardless.

Agreed, the contribution of pickle packets here is to point out that if
we include the DNS names of sender and receiver in the initial transport
connection, we can use them to index the public keys that can be retrieved
from DNS and used to establish a Master_Key or something similar.
You could use this key for AO if you wanted.

-Pete
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to