Re: potential new IETF WG on anonymous IPSec

2004-09-20 Thread John Kelsey
>From: "Major Variola (ret)" <[EMAIL PROTECTED]> >Sent: Sep 17, 2004 10:27 PM >To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> >Subject: Re: potential new IETF WG on anonymous IPSec >At 06:20 AM 9/17/04 +, Justin wrote: >>On 2004-09-16T20:11:

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Bill Stewart
At 04:05 PM 9/16/2004, Joe Touch wrote: FWIW, the other system we were referring to - TCP-MD5 - works at the TCP layer. It rejects packets within TCP, before any further TCP processing, that don't match the MD5 hash. It isn't BGP authentication. Oh - I'd misunderstood. Yes, that sounds much hard

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Justin
On 2004-09-17T19:27:09-0700, Major Variola (ret) wrote: > > At 06:20 AM 9/17/04 +, Justin wrote: > >On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote: > >> At 02:17 PM 9/16/04 -0700, Joe Touch wrote: > >> >Except that certs need to be signed by authorities that are trusted. > > >> Name o

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Major Variola (ret)
At 09:09 AM 9/17/04 +0200, Thomas Shaddack wrote: >On Thu, 16 Sep 2004, Major Variola (ret) wrote: > >> At 02:17 PM 9/16/04 -0700, Joe Touch wrote: >> >Except that certs need to be signed by authorities that are trusted. >> >> Name one. > >You don't have to sign the certs. Use self-signed ones, th

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Major Variola (ret)
At 06:20 AM 9/17/04 +, Justin wrote: >On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote: >> >> At 02:17 PM 9/16/04 -0700, Joe Touch wrote: >> >Except that certs need to be signed by authorities that are trusted. >> >> Name one. > >Oh, come on. Nothing can be absolutely trusted. How much

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Joe Touch
Ian Grigg wrote: ... I wouldn't think that the encryption need be opportunistic; in the BGP backbone world, as you noted, peers are known a-priori, and should have certs that could be signed by well-known, trusted CAs. Let's see if I can make these assumptions clearer, because I still perceive t

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Ian Grigg
Joe Touch wrote: Ian Grigg wrote: On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive eavesdropping attacks. Also, anyone setti

Re: potential new IETF WG on anonymous IPSec

2004-09-17 Thread Thomas Shaddack
On Thu, 16 Sep 2004, Major Variola (ret) wrote: > At 02:17 PM 9/16/04 -0700, Joe Touch wrote: > >Except that certs need to be signed by authorities that are trusted. > > Name one. You don't have to sign the certs. Use self-signed ones, then publish a GPG signature of your certificate in a known

Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Justin
On 2004-09-16T20:11:56-0700, Major Variola (ret) wrote: > > At 02:17 PM 9/16/04 -0700, Joe Touch wrote: > >Except that certs need to be signed by authorities that are trusted. > > Name one. Oh, come on. Nothing can be absolutely trusted. How much security is enough? Aren't the DOD CAs trusted

Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Major Variola (ret)
At 02:17 PM 9/16/04 -0700, Joe Touch wrote: >Except that certs need to be signed by authorities that are trusted. Name one.

Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Joe Touch
Bill Stewart wrote: At 02:17 PM 9/16/2004, Joe Touch wrote: Ian Grigg wrote: On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive

Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Bill Stewart
At 02:17 PM 9/16/2004, Joe Touch wrote: Ian Grigg wrote: On the backbone, between BGP peers, one would have thought that there are relatively few attackers, as the staff are highly trusted and the wires are hard to access - hence no active attacks going on and only some passive eavesdropping attack

Re: potential new IETF WG on anonymous IPSec

2004-09-16 Thread Joe Touch
Ian Grigg wrote: Bill Stewart wrote: Also, the author's document discusses protecting BGP to prevent some of the recent denial-of-service attacks, and asks for confirmation about the assertion in a message on the IPSEC mailing list suggesting "E.g., it is not feasible for BGP routers to be conf

Re: potential new IETF WG on anonymous IPSec

2004-09-15 Thread Ian Grigg
Bill Stewart wrote: Also, the author's document discusses protecting BGP to prevent some of the recent denial-of-service attacks, and asks for confirmation about the assertion in a message on the IPSEC mailing list suggesting "E.g., it is not feasible for BGP routers to be configured with the

Re: potential new IETF WG on anonymous IPSec

2004-09-13 Thread Major Variola (ret)
Currently BGP is "secured" by 1. accepting BGP info only from known router IPs 2. ISPs not propogating BGP from the edge inwards Its a serious vulnerability (as in, take down the net), equivalent to the ability to confuse the post office machinery that sorts postcards. All you need to do is subve

Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org) (fwd from touch@ISI.EDU)

2004-09-11 Thread R. A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 11 Sep 2004 14:53:59 -0700 (PDT) From: bear <[EMAIL PROTECTED]> To: Eugen Leitl <[EMAIL PROTECTED]> Cc: Cryptography List <[EMAIL PROTECTED]> Subject: Re: [anonsec] Re: potential new IETF WG on anonymous IPSec

Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org))

2004-09-11 Thread R. A. Hettinga
;[EMAIL PROTECTED]> Subject: Re: anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from [EMAIL PROTECTED])) User-Agent: Mutt/1.4.1i Sender: [EMAIL PROTECTED] On Sat, Sep 11, 2004 at 11:38:00AM -0700, Joe Touch wrote: > >>Although anonymous access i

anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org))

2004-09-11 Thread R. A. Hettinga
t; Subject: anonymous IP terminology (Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from [EMAIL PROTECTED])) User-Agent: Mutt/1.4.1i Sender: [EMAIL PROTECTED] Joe Touch <[EMAIL PROTECTED]> wrote: > >The point has nothing to do with anonymity; > > The last one, agreed.

Re: potential new IETF WG on anonymous IPSec

2004-09-11 Thread Joe Touch
Bill Stewart wrote: At 12:57 PM 9/9/2004, Hal Finney wrote: > http://www.postel.org/anonsec To clarify, this is not really "anonymous" in the usual sense. Rather it is a proposal to an extension to IPsec to allow for unauthenticated connections. Presently IPsec relies on either pre-shared

Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from hal@finney.org) (fwd from touch@ISI.EDU)

2004-09-11 Thread R. A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Fri, 10 Sep 2004 18:20:28 +0200 From: Eugen Leitl <[EMAIL PROTECTED]> To: Cryptography List <[EMAIL PROTECTED]> Subject: Re: [anonsec] Re: potential new IETF WG on anonymous IPSec (fwd from [EMAIL PROTECTED]) (fwd

Re: potential new IETF WG on anonymous IPSec

2004-09-10 Thread Bill Stewart
At 12:57 PM 9/9/2004, Hal Finney wrote: > http://www.postel.org/anonsec To clarify, this is not really "anonymous" in the usual sense. Rather it is a proposal to an extension to IPsec to allow for unauthenticated connections. Presently IPsec relies on either pre-shared secrets or a trusted

Re: potential new IETF WG on anonymous IPSec

2004-09-10 Thread Zooko O'Whielcronx
On 2004, Sep 09, , at 16:57, Hal Finney wrote: To clarify, this is not really "anonymous" in the usual sense. Rather it is a proposal to an extension to IPsec to allow for unauthenticated connections. Presently IPsec relies on either pre-shared secrets or a trusted third party CA to authenticate