Joe,
>
yeah, I like OK (and I like IKE too, for those of us old enough to
appreciate that election slogan)

I'm still a little hesitant, thinking on it further, about the term "opportunistic" in this sense at all.

BTNS uses unsigned key exchanged, and there's nothing "opportunistic" about it. Unsigned authentication is the goal from the start.

OE as defined in RFC 4322 isn't about using unsigned key exchange; the "opportunistic" sense is derived from using keys retrieved from DNS without prior agreement. That's not what happens in BTNS.
agreed.
Paul just noted:
"Opportunistic keying does provide authentication, it's just that
the authentication is only to the public key and is not
tightly bound to any other type of identification (address, name, etc.)"
Public keys are not principles. We went through that long and painful discussion during the SPKI days. So, saying that OE provide authentication of a key seems
meaningless to me, especially if the key is ephemeral.
I.e., fundamentally, opportunistic approaches are completely different from those that don't ever bother to authenticate. I don't think it's useful (and could be confusing) to confuse the two by overlapping terminology.
We'll, we don't have an agreed upon definition for O* yet. My view is that the primary goal of this effort is to remove barriers to using encryption. Since authenticating the identity or a peer or server has tended to be a barrier, we seem willing to make that form of authentication optional. But, we still prefer authentication, because we'd like to avoid MiTM attacks. That suggests that O* refers to techniques that emphasize encryption, prefer that it be authenticated, but are willing to fall back to un-autnenticated encryption if that's thbe best we can do. (And to fall back
to plaintext if the peer/server is not capable of our new-fangled O*)
I don't like the term "optimistic" either; it too implies something that you "hope works". There's no "hope" associated with unsigned key exchange; you do it (IMO) because you know what it is and you know its impact (e.g., raising the bar of an attacker to performing a full key exchange, vs. just tossing single packets like RSTs around).
I'm not wedded top either term, but I'd like to emphasize that the encryption process is
the same in all cases; it's the key management that's different.

Is there a reason not to just call unauthenticated key exchange what it is - unauthenticated key exchange?
I think we want more than that, as I described above, hence the desire to coin a new term.

Steve

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to