Manav Bhatia,

        Did you read my email and my arguments.
        
        I am only concerned/dealing with interoperability...
        The Secondly section deals with Key-ID..

        Section D3 specifies MD5 as the only auth method. It specificly
        stated "message digest".
        1) Do you agree?

        In every implementation that I know of type 2 is MD5. That
        makes it a MD5 "defacto standard" with respect to type 2.
        2) Do you agree? Do you know what is meant as a "defacto
          standard"? 

        Please inform me of at least 1 implmentation does not assume
        type 2 is MD5 that is not based on this draft.
        3) Do you know of even 1 customer released implementation?

        Until that is the case, I think type 2 should be "reserved" for
        MD5 to DECREASE the chance of any interoperability concerns.

        Their is no reason that I know of, that a additional type, say type
        3 could not then be used for this RFC's auth method..
        4) Why can't shouldn't a new type be specified? 

        Thus, the point is that if ALL implementations before this draft
        suggestion used type 2 as MD5, why shouldn't a new type be used
        for HMAC-SHA?

        Secondly:
        I understand that the "Key-ID" from 2328 is supposely to identify the
        alg and secret key,  per "interface".
        However, I have no knowledge that certain bits within the key-id would
        IETF uniquely identify MD5 vs HMAC-SHA. Until someone informs me that
        all key-ids have this global uniqueness. With virtual interfaces
        and non-interface flooding scope OSPF pkts, I consider this a possible
        issue that doesn't need to be addressed when their is a simple ANSWER.

        THEN, since we have additional types available and 100% of
implementations
        use MD5 as type 2, I would hope that some else with more clought would 
        have suggested, the simple approach and officially allocate type 2 as
MD5 and 
        allocate a new type for additional auth methods..
        I am actually surprised that I saw no-one else suggested this!!!!

        Mitchell Erblich
        ------------------
        

Manav Bhatia wrote:
> 
> Mitchell,
> 
> Type 2 in RFC 2328 is not reserved for MD5, but is instead used to denote 
> some sort of Cryptographic Authentication as opposed to NULL authentication 
> and simple password scheme.
> 
> Refer to Figure 2 in our draft. It shows the way the authentication data must 
> be filled in the OSPF header if the Authentication Type is set to 2. 
> Cryptographic Authentication (Type 2) as defined in RFC 2328 allows for any 
> auth algorithm to be used without altering the protocol packets. This is done 
> by including the Key ID in the authentication data. Key ID carried in the 
> packet uniquely identifies an OSPF SA and gives the authentication algorithm 
> and the secret key that is used to create the message digest appended to the 
> OSPF packet.
> 
> If the Key ID maps to a HMAC-SHA algorithm then the HMAC is appended to the 
> OSPF packet instead of the MD5 digest.
> 
> Cheers,
> Manav
> 
> ----- Original Message ----
> From: Erblichs <[EMAIL PROTECTED]>
> To: Vishwas Manral <[EMAIL PROTECTED]>
> Cc: [email protected]; Manav Bhatia <[EMAIL PROTECTED]>
> Sent: Friday, 18 August, 2006 11:50:46 PM
> Subject: Re: [OSPF] Revised OSPF HMAC SHA Authentication Draft
> 
> Vishwas Manral, et al,
> 
>     RFC 2328 specificly specifies "message digest" in section D3.
> 
>     I am not expert in this field, but wouldn't a section
>     why Type 2 shouldn't then be reserved for MD5?
> 
>     It should ALSO be a simple argument that any type 2 before now
>      was using MD5. Thus it is a defacto standard for the type.
> 
>     And then and a aditional type by allocated for HMAC-SHA auth.
> 
>     Mitchell Erblich
>     ----------------
> 
> Vishwas Manral wrote:
> >
> > Hi,
> >
> > We have updated the OSPF HMAC-SHA authentication draft with the comments
> > that we received on the list and offline.
> >
> > The updated version has a short section which discusses backwards
> > compatibility, similarities and differences from using MD5 (which is
> > explained in Section 5 of 2328), etc.
> >
> > http://www.ietf.org/internet-drafts/draft-bhatia-manral-white-ospf-hmac-sha-
> > 02.txt
> >
> > Please let us know if there are further modifications desired.
> >
> > Cheers,
> > Manav, Vishwas, et al.
> >
> > ----- Original Message -----
> > From: <[EMAIL PROTECTED]>
> > To: <[email protected]>
> > Sent: Friday, August 18, 2006 1:20 AM
> > Subject: I-D ACTION:draft-bhatia-manral-white-ospf-hmac-sha-02.txt
> >
> > > >A New Internet-Draft is available from the on-line Internet-Drafts
> > > > directories.
> > > >
> > > >
> > > > Title : OSPF HMAC Cryptographic Authentication
> > > > Author(s) : M. Bhatia, et al.
> > > > Filename : draft-bhatia-manral-white-ospf-hmac-sha-02.txt
> > > > Pages : 11
> > > > Date : 2006-8-17
> > > >
> > > > This document describes a mechanism for authenticating OSPF packets
> > > >   by making use of the HMAC algorithm in conjunction with the SHA
> > > >   family of cryptographic hash functions. Because of the way the hash
> > > >   functions are used in HMAC construction, the collision attacks
> > > >   currently known against SHA-1 do not apply.
> > > >
> > > >   This will be done in addition to the already documented
> > > >   authentication schemes described in the base specification.
> > > >
> > > > A URL for this Internet-Draft is:
> > > >
> > http://www.ietf.org/internet-drafts/draft-bhatia-manral-white-ospf-hmac-sha-
> > 02.txt
> > > >
> > > > To remove yourself from the I-D Announcement list, send a message to
> > > > [EMAIL PROTECTED] with the word unsubscribe in the body of
> > > > the message.
> > > > You can also visit https://www1.ietf.org/mailman/listinfo/I-D-announce
> > > > to change your subscription settings.
> > > >
> > > > Internet-Drafts are also available by anonymous FTP. Login with the
> > > > username "anonymous" and a password of your e-mail address. After
> > > > logging in, type "cd internet-drafts" and then
> > > > "get draft-bhatia-manral-white-ospf-hmac-sha-02.txt".
> >
> > _______________________________________________
> > OSPF mailing list
> > [email protected]
> > https://www1.ietf.org/mailman/listinfo/ospf
> 
> _______________________________________________
> OSPF mailing list
> [email protected]
> https://www1.ietf.org/mailman/listinfo/ospf

_______________________________________________
OSPF mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ospf

Reply via email to