Re: [Hipsec] rfc5201-bis issue 35: limiting ECC cofactor to 1

2012-07-11 Thread Robert Moskowitz
I agree. This is pretty much all we need to say about this. On 06/27/2012 01:19 AM, Henderson, Thomas R wrote: This was already proposed to the list a while back: http://www.ietf.org/mail-archive/web/hipsec/current/msg03462.html so I'd like to close this issue by adopting the proposed text;

Re: [Hipsec] rfc5201-bis issue 29: Use different RSA mode OAEP/PSS

2012-07-13 Thread Robert Moskowitz
On 06/27/2012 01:10 AM, Henderson, Thomas R wrote: Regarding this open issue, which I posted about on June 18 [*], I propose the following changes to the RFC 5201-bis text: 1) Section 3 OLD TEXT: HIP implementations MUST support the Rivest Shamir Adelman (RSA) [RFC3110] public key

[Hipsec] Minor TLA conflict

2012-08-10 Thread Robert Moskowitz
in State Machine, EC - Exchange Compete And of course this is also Elliptic Curve. Now in BEX we never reference just EC, only ECDH and ECDSA. But I already have one commenter on this one. ___ Hipsec mailing list Hipsec@ietf.org

[Hipsec] 5202-bis ESP cipher suites

2012-09-12 Thread Robert Moskowitz
We have tried to limit the suites supported in 5202 and have our own suite list, different from: http://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xml In part this is good as many of those suites are old and should be just lost. But some are marginially important and it is

[Hipsec] HIP and UDP

2012-09-12 Thread Robert Moskowitz
I really should know this, and if I dig a bit, I will find it I suspect, but are UDP apps (eg tftp) bound to IP addresses as TCP apps (via the TCB). Is there a UCB? I can't find my intro to TCP/IP by Stevens book Why I ask, you ask? I am assuming the same address mapping is occuring in

Re: [Hipsec] review of RFC4423-bis

2012-09-27 Thread Robert Moskowitz
Great review. Thank you. Just some quick notes (Hoiidays through Oct 11 and I only have a few work hours until then and I got kicked out of my office as it is also a guest room; working in my NOC). On 09/27/2012 12:27 AM, Henderson, Thomas R wrote: I had another read through of

Re: [Hipsec] review of RFC4423-bis

2012-09-28 Thread Robert Moskowitz
I will publish an ID today with all changes so far. Given my Holiday schedule through the 10th, I want to keep things current. Will take a bit to work through a couple of these recommendations, but here is most: On 09/27/2012 12:27 AM, Henderson, Thomas R wrote: I had another read through

[Hipsec] iEEE 802.15.9 document review

2014-04-30 Thread Robert Moskowitz
I need review of the HIP portion of the 802.15.9 document. Since this is a 'private' p802 document I cannot make it publicly available. As the 802.15.9 chair I can designate outside reviewers; like a couple, not a couple hundred. Plus the HIP content needs work. Best helper is someone(s)

Re: [Hipsec] HIT collision probability

2014-05-05 Thread Robert Moskowitz
/wiki/Birthday_problem On 5/4/14, 8:40 AM, Robert Moskowitz r...@htt-consult.com wrote: What population of HIs is needed for a 1%, 10%, 50% probability of a HIT collision? I had the math once (like back in '99 or '00) and can't find it (probably did not survive the Eudora to Thunderbird

Re: [Hipsec] HIT collision probability

2014-05-05 Thread Robert Moskowitz
On 05/04/2014 11:40 AM, Robert Moskowitz wrote: What population of HIs is needed for a 1%, 10%, 50% probability of a HIT collision? I had the math once (like back in '99 or '00) and can't find it (probably did not survive the Eudora to Thunderbird migration). Thought I actually had

Re: [Hipsec] HIT collision probability

2014-05-05 Thread Robert Moskowitz
am doing something wrong in LibreCalc with the formula: =EXP(-(B6^2)/(2*C6)) Where B6 is the cell with K (3.86e+12) and C6 is n (2^96). I am getting an answer of 99%. Rene On 5/5/2014 2:50 PM, Robert Moskowitz wrote: On 05/04/2014 11:40 AM, Robert Moskowitz wrote: What population of HIs

[Hipsec] Final thoughts on - Re: HIT collision probability

2014-05-06 Thread Robert Moskowitz
. On 05/05/2014 04:50 PM, Robert Moskowitz wrote: On 05/05/2014 04:23 PM, Rene Struik wrote: Hi Bob: Let me clarify, the quantity p(k,n) below is the probability that k randomly picked elements taken from an n-set are all different (i.e., no collision occurs). You may be looking

[Hipsec] ESP in clientVPN tunnel mode - what is needed in exchange

2014-05-19 Thread Robert Moskowitz
I have a real need to provide ESP tunnel mode from a HIP client to a gateway. The world just won't go as nicely as I would have wanted it to. In the HIPL manual, there is an example of running OpenVPN within the BEET ESP connection, but I don't think that ends up with the same as ESP tunnel

Re: [Hipsec] ESP in clientVPN tunnel mode - what is needed in exchange

2014-05-19 Thread Robert Moskowitz
me how easy this is to handle. On 05/19/2014 02:08 PM, Robert Moskowitz wrote: I have a real need to provide ESP tunnel mode from a HIP client to a gateway. The world just won't go as nicely as I would have wanted it to. In the HIPL manual, there is an example of running OpenVPN within

Re: [Hipsec] ESP in clientVPN tunnel mode - what is needed in exchange

2014-05-19 Thread Robert Moskowitz
On 05/19/2014 02:14 PM, Robert Moskowitz wrote: More thoughts. 2 reserved bits can be used: 1 bit to indicate tunnel rather than transport 1 bit to indicate IPv4 or IPv6 tunnel addressing Initially use the HIT/LSI to carry DHCP/RA packets through tunnel? Though LSI is a bit messy. Though

Re: [Hipsec] ESP in clientVPN tunnel mode - what is needed in exchange

2014-05-20 Thread Robert Moskowitz
On 05/19/2014 02:53 PM, Miika Komu wrote: Hi, On 05/19/2014 09:08 PM, Robert Moskowitz wrote: I have a real need to provide ESP tunnel mode from a HIP client to a gateway. The world just won't go as nicely as I would have wanted it to. location-based security is old fashioned

[Hipsec] Looking for slides on Relay server

2014-05-22 Thread Robert Moskowitz
At times I would like to strangle myself. WHY did I ever create private addresses for IPv4 and thus create a market for NAT boxes? Well if I have not been involved, it would have still happened. The use cases were out there and ROAD was dead. Enough handwringing. We have Nasty NATs

[Hipsec] Teredo and HIP mobility/NAT

2014-05-23 Thread Robert Moskowitz
I have thought a lot about this and generally it works out bad no matter how you slice it. Well, if I was writing the network kernel, I would incorporate Teredo so that all interfaces presented an IPv6 address at all times and if it had a 'native' IPv6 would not use Teredo. Basically tying

Re: [Hipsec] processing review comments on RFC 5201-bis

2014-07-06 Thread Robert Moskowitz
On 07/02/2014 11:32 AM, Miika Komu wrote: Hi, On 07/02/2014 05:26 PM, Miika Komu wrote: Hi, On 06/30/2014 08:46 PM, Tom Taylor wrote: 3) Section 5.2.18: given the strict ordering of HIP parameters, the initial plaintext for the Encrypted content (type and length of initial parameter) may be

Re: [Hipsec] NULL encryption mode in RFC 5202-bis

2014-07-08 Thread Robert Moskowitz
On 07/08/2014 06:33 AM, Stephen Farrell wrote: Thanks Tom, On 08/07/14 05:54, Tom Henderson wrote: Hi all, Apologies for cross-posting, but Stephen Farrell raised a DISCUSS (seconded by Kathleen Moriarty) in the IESG evaluation of RFC 5202-bis: Using the Encapsulating Security Payload

Re: [Hipsec] NULL encryption mode in RFC 5202-bis

2014-07-09 Thread Robert Moskowitz
Sent to the HIPSEC list from my HIPSEC user: The downgrade attack in HIP (RFC 5201-bis) is hard. R1 is a signed payload, and in many use cases, the Initiator has pre-deteremined the Responder's HI and HIT so it can check the SIG before processing the ESP TRANSFORM parameters. In sensornets

Re: [Hipsec] [saag] NULL encryption mode in RFC 5202-bis

2014-07-22 Thread Robert Moskowitz
On 07/21/2014 08:51 PM, Henry B Hotz wrote: The basic issue, as always, is interoperability. NULL should not be an interoperable *operational* capability. In this regard, I have a hard time distinguishing between NULL with HMAC-SHA256 and CMAC or GMAC. With this (secure communications)

Re: [Hipsec] [saag] NULL encryption mode in RFC 5202-bis

2014-07-22 Thread Robert Moskowitz
On 07/22/2014 11:26 AM, Michael Richardson wrote: Ted Lemon ted.le...@nominum.com wrote: It is a switch to request integrity only. Or to only allow integrity only. Either party MUST be able to reject an integrity only negotiation. That's not good enough. It should be

Re: [Hipsec] FYI: ORCHIDv2 prefix is 2001:20::/28

2014-07-24 Thread Robert Moskowitz
On 07/22/2014 04:04 PM, Julien Laganier wrote: Pls. see: http://www.iana.org/assignments/iana-ipv6-special-registry I am assuming a different prefix will help interop between HIP and HIPv2. ___ Hipsec mailing list Hipsec@ietf.org

[Hipsec] Verizon employment ending Jan 5 2015

2014-12-10 Thread Robert Moskowitz
I have been silent the past month for a sad, work, reason. On Oct 24, Verizon did a major product realignment and the group I am in was tagged for termination the end of the year. We were told that there would be openings in other groups. I have spent the past 6 weeks putting together

Re: [Hipsec] AUTH48 [LB]: 5201-bis - Re: Reference problem in 5201-bis wrt SECP160R1

2015-01-28 Thread Robert Moskowitz
., (if memory serves me well) with some copy protection schemes, such as DTCP. I hope this helps. Best regards, Rene On 08/08/2012 9:24 AM, Robert Moskowitz wrote: For low security we have SECP160R1 from: [SECG] SECG, Recommended Elliptic Curve Domain

[Hipsec] Need help restructering Annex C (HIP) for IEEE 802.15.9

2015-02-25 Thread Robert Moskowitz
Short time frame, as I really need to get this done before the end of next week. Actually first draft this week would be good. Any one interested I can provide the current 802.15.9 draft. All the public 802.15.9 documents are at:

Re: [Hipsec] Next steps in the WG

2015-04-13 Thread Robert Moskowitz
Miika and I are working to finish 4423-bis. Outside of the WG, Rene and I are working to finish HIP-DEX. I can submit this as an independent submission, or the workgroup can submit it. I should note that it is now being referenced by Zigbee (and IEEE 802.15.9), so I really have to finish

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-dex-04.txt

2015-07-20 Thread Robert Moskowitz
-hip-dex-04.txt Date: Sun, 19 Jul 2015 23:15:57 -0700 From: internet-dra...@ietf.org To: Rene Hummen hum...@comsys.rwth-aachen.de, Rene Hummen hum...@comsys.rwth-aachen.de, Robert Moskowitz r...@htt-consult.com, Robert Moskowitz r...@htt-consult.com A new version of I-D, draft-moskowitz

[Hipsec] Status of HIP DEX

2016-01-20 Thread Robert Moskowitz
Although draft-moskowitz-hip-dex-04 expired yesterday, I have been active with it as follows: IEEE 802.15.9 references both HIP BEX and DEX. This Recommended Standard will be starting IEEE Sponsor Ballot recirculation #2 Jan 21 on a 10 day voting cycle. We anticipate our one NO voter to

Re: [Hipsec] New WG item: HIP Diet EXchange (DEX)

2016-03-01 Thread Robert Moskowitz
I have uploaded the current draft with the name change. I will look at what it will take to add Curve25519 (RFC 7748). On 03/01/2016 02:58 AM, Gonzalo Camarillo wrote: Authors of draft-moskowitz-hip-rg-dex, could you please revise the draft as a WG item? Please, use the following file name in

Re: [Hipsec] IPCOMP support in HIP

2016-03-10 Thread Robert Moskowitz
algorithm, or a value of ZERO if none. R2 would have the confirmed value. NOTIFY could be used to set up IPCOMP (or change it) at a later time. Comments? On 03/09/2016 10:20 AM, Robert Moskowitz wrote: Why did we not create a parameter to negotiate IPCOMP (currently RFC 3173)? In IKEv2

Re: [Hipsec] IPCOMP support in HIP

2016-03-10 Thread Robert Moskowitz
. Plus with DEX on constrained networks, compression is even more valuable. But can you point me to a paper on the TLS compression attack? On 03/10/2016 02:10 PM, Derek Fawcus wrote: On Thu, Mar 10, 2016 at 08:29:15AM -0500, Robert Moskowitz wrote: I have found comp in TLS, RFC 3749, so HIP's ESP

Re: [Hipsec] IPCOMP support in HIP

2016-03-10 Thread Robert Moskowitz
to take your outer envelope that contains your XML and compress the whole thing. On 03/10/2016 02:10 PM, Derek Fawcus wrote: On Thu, Mar 10, 2016 at 08:29:15AM -0500, Robert Moskowitz wrote: I have found comp in TLS, RFC 3749, so HIP's ESP is the only one missing compression. How did I miss

[Hipsec] IPCOMP support in HIP

2016-03-09 Thread Robert Moskowitz
Why did we not create a parameter to negotiate IPCOMP (currently RFC 3173)? In IKEv2 it is negotiated in NOTIFY messages, not the basic exchange and becomes part of the daughter SA(s). On contrained networks, IPCOMP could well be of value. Also if HIP is used to establish the SAs for SSE

Re: [Hipsec] I-D Action: draft-ietf-hip-dex-02.txt

2016-03-21 Thread Robert Moskowitz
Identity Protocol of the IETF. Title : HIP Diet EXchange (DEX) Authors : Robert Moskowitz Rene Hummen Filename: draft-ietf-hip-dex-02.txt Pages : 47 Date: 2016-03-21 Abstract

[Hipsec] Status of IEEE 802.15.9

2016-03-07 Thread Robert Moskowitz
iEEE 802.15.9 is Key Management Transport for 802.15.4. It calls out support for a number of KMPs defined here in the IETF, including both HIP BEX and DEX. This is one of the many reasons why I want to get HIP DEX published as an RFC, as only RFCs can be referenced in a published IEEE

Re: [Hipsec] I-D Action: draft-ietf-hip-dex-01.txt

2016-03-21 Thread Robert Moskowitz
-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Host Identity Protocol of the IETF. Title : HIP Diet EXchange (DEX) Authors : Robert Moskowitz Rene Hummen Filename: draft

[Hipsec] HIP in a new Session Layer Service

2016-03-21 Thread Robert Moskowitz
I invite you all to look at work Sue Hares, I, and a few others have been doing in developing a Session Layer Service that includes security at the session layer. FOr IETF reasons, Sue did the top-level draft within I2NSF: https://www.ietf.org/internet-drafts/draft-hares-i2nsf-ssls-00.txt

Re: [Hipsec] Using a PAKE within HIP for enrollment

2016-07-27 Thread Robert Moskowitz
at? On 07/27/2016 06:19 AM, Robert Moskowitz wrote: I am looking at a HIT enrollment function using 5403-bis. But why should the Registrar accept the Register. This is our basic need of an Out-off-Band process to trust an enrollment. So assume that some process establishes a PSK between

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hierarchical-hip-00.txt

2016-08-03 Thread Robert Moskowitz
-hierarchical-hip-00.txt Date: Wed, 03 Aug 2016 20:37:24 -0700 From: internet-dra...@ietf.org To: Xiaohu Xu <xuxia...@huawei.com>, Robert Moskowitz <r...@htt-consult.com> A new version of I-D, draft-moskowitz-hierarchical-hip-00.txt has been successfully submitted by Robe

Re: [Hipsec] A review of draft-ietf-hip-dex-02.txt

2016-09-12 Thread Robert Moskowitz
On 09/11/2016 04:06 PM, René Hummen wrote: Hello Miika, going through your email again, I saw a total of four suggestions. Three of them refer to imprecisions in the text of RFC 7401 (which I copy/pasted for HIP DEX). There, I understood that consistency with RFC 7401 has a higher priority

Re: [Hipsec] Mirja Kühlewind's No Objection on draft-ietf-hip-rfc5206-bis-13: (with COMMENT)

2016-09-13 Thread Robert Moskowitz
I have one question on sec 5.4 before I enter a comment... On 09/12/2016 03:28 PM, Mirja Kuehlewind wrote: 5) section 5.4: How long will an address be in UNVERIFIED state in case the verification is not successful (no reply). Is there a timer? How often will the peer retry the verification

[Hipsec] Comment on VIA_RVS parameter - 5204 & 06 -bis

2016-09-15 Thread Robert Moskowitz
5206-bis specifies how to user RVS for the 'double-jump' mobility problem. 3.2.3 1) says: 1. The mobile host sending an UPDATE to the peer, and not receiving an ACK, MAY resend the UPDATE to a rendezvous server (RVS) of the peer, if such a server is known. But it DOES know there is an RVS

Re: [Hipsec] Comment on VIA_RVS parameter - 5204 & 06 -bis

2016-09-26 Thread Robert Moskowitz
On 09/26/2016 09:08 AM, Miika Komu wrote: Hi, On 09/16/2016 02:45 PM, Robert Moskowitz wrote: On 09/16/2016 06:57 AM, Tom Henderson wrote: On Thu, 15 Sep 2016, Robert Moskowitz wrote: 5206-bis specifies how to user RVS for the 'double-jump' mobility problem. 3.2.3 1) says: 1

[Hipsec] Please refresh my memory on HIP_SIGNATURE in UPDATE

2016-09-18 Thread Robert Moskowitz
I cannot remember why we mandated HIP_SIGNATURE in UPDATE packet, particularly when we have the HIP_MAC. Sec 5.3.5 in 7401. I am sure we had a good reason, but I am not finding it thanks Bob ___ Hipsec mailing list Hipsec@ietf.org

Re: [Hipsec] Mirja Kühlewind's No Objection on draft-ietf-hip-rfc5206-bis-13: (with COMMENT)

2016-09-19 Thread Robert Moskowitz
On 09/19/2016 06:19 AM, Tom Henderson wrote: Bob, sorry for the delay in replying (inline below) On 09/13/2016 02:14 AM, Robert Moskowitz wrote: I have one question on sec 5.4 before I enter a comment... On 09/12/2016 03:28 PM, Mirja Kuehlewind wrote: 5) section 5.4: How long

[Hipsec] 4 Internet drafts

2016-09-28 Thread Robert Moskowitz
drafts minimal to put the proposal together. Bob A new version of I-D, draft-moskowitz-hip-based-5gpp-ip-mobility-00.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name:draft-moskowitz-hip-based-5gpp-ip-mobility Revision:00 Title:HIP

Re: [Hipsec] Comment on VIA_RVS parameter - 5204 & 06 -bis

2016-09-27 Thread Robert Moskowitz
On 09/27/2016 04:58 AM, Miika Komu wrote: Hi, On 09/27/2016 03:56 AM, Robert Moskowitz wrote: On 09/26/2016 09:08 AM, Miika Komu wrote: Hi, On 09/16/2016 02:45 PM, Robert Moskowitz wrote: On 09/16/2016 06:57 AM, Tom Henderson wrote: On Thu, 15 Sep 2016, Robert Moskowitz wrote

Re: [Hipsec] I-D Action: draft-ietf-hip-native-nat-traversal-14.txt

2016-11-24 Thread Robert Moskowitz
Miika, Does this draft cover the use case where the mobile HIP device moves from one NATed network to another. Consider you are in Starbucks and move next door to Dunkin Donuts. Your device did this augmented BEX exchange in Starbucks. You walk into DD and your interface decides the

Re: [Hipsec] I-D Action: draft-ietf-hip-native-nat-traversal-14.txt

2016-11-24 Thread Robert Moskowitz
What is 'co called' in this text: o In ICE, the conflict when two communicating end-points take the same controlling role is solved using random values (co called tie-breaker value). In this protocol, the conflict is solved by the standard HIP base exchange procedure, where

Re: [Hipsec] I-D Action: draft-ietf-hip-native-nat-traversal-14.txt

2016-11-25 Thread Robert Moskowitz
:59 AM, Miika Komu wrote: Hi Robert, yes, mobility support is specified in the draft. *From:*Robert Moskowitz [mailto:r...@htt-consult.com] *Sent:* Friday, November 25, 2016 6:33 AM *To:* Miika Komu <miika.k...@ericsson.com>; hipsec@ietf.org *Subject:* Re: [Hipsec] I-D Action: draft-ie

Re: [Hipsec] WGLC: draft-ietf-hip-dex-04

2016-11-21 Thread Robert Moskowitz
I will start on it Tuesday. Bob On 11/20/2016 03:26 AM, Gonzalo Camarillo wrote: Hi Tom, thanks. Your comments seem to be the only one we got on this draft during the WGLC. Authors, could you please revise the draft in order to address these comments? Thanks, Gonzalo On 20/11/2016 4:32 AM,

Re: [Hipsec] Updated hip drafts

2016-11-02 Thread Robert Moskowitz
... well... Cheers, Gonzalo On 28/10/2016 3:31 AM, Robert Moskowitz wrote: I just updated a a set of drafts: These define a Secure Session Layer Service. The last has how to manage it with HIP and defines some new HIP parameters to negotiate sse and gpcomp: https://www.ietf.org/internet-drafts

[Hipsec] Privacy discuss over on the IDEAS list...

2017-10-18 Thread Robert Moskowitz
First, it seems I had problems with my HIP list folder and have not seen any messages since around May. There here, and I will read them... Now. Please read: https://mailarchive.ietf.org/arch/msg/ideas/GbyBs812xGVAN9LFRbpAp3lUuys And some follow up discussions. Basically IDEAS is targeting

Re: [Hipsec] Genart telechat review of draft-ietf-hip-rfc4423-bis-19

2018-04-05 Thread Robert Moskowitz
ues: N/A Nits/editorial comments: N/A -- Standard Robert Moskowitz Owner HTT Consulting C:248-219-2059 F:248-968-2824 E:r...@labs.htt-consult.com There's no limit to what can be accomplished if it doesn't matter who gets the credit ___ Hipsec mailin

Re: [Hipsec] Opsdir last call review of draft-ietf-hip-dex-06

2018-03-02 Thread Robert Moskowitz
On 02/23/2018 03:23 AM, Qin Wu wrote: Reviewer: Qin Wu Review result: Ready Summary: This document defines the Host Identity Protocol Diet EXchange (HIP DEX) protocol for constrained devices. The draft is well written. I believe it is ready for publication. Major issue: None Minor

[Hipsec] hotRFC and side meeting - Trustworthy Multipurpose RemoteID

2019-07-03 Thread Robert Moskowitz
Hello all, I thank all that have been working away on the last few items while I have been struggling along. Recently, I met Stuart Card and Adam Wiethuechter of Axenterprize. They have in a number of gov projects where they have deployed HIP based solutions.  All quietly on their own.

[Hipsec] Making some sample Hierarchical HITs

2019-08-14 Thread Robert Moskowitz
This is connected to the Trustworthy Multipurpose Remote IDs (tm-...@ietf.org) Right now I am working on what a eddsa pki would be that would back up the proposed HHITs and various repositories.  For this I want to generate some testing HHITs. These HHITs will be used in x.509 certs as in

[Hipsec] X.509 CSR in HIP registration

2019-08-21 Thread Robert Moskowitz
I have been working on my Hierarchical HIT drafts.  I have been testing building x.509 certs with them as the SAN.  Thing is were do these certs come from? So I moved on to when the device uses HIP Registration to register the HHIT to its Registry, it could present a CSR in the payload and if

[Hipsec] New crypto for HIP

2019-08-28 Thread Robert Moskowitz
I am a bit frustrated here on delays on a number of fronts. I have been working silently to put some final touches on DEX and discussions on Native NAT. But more time on Hierarchical HITs, along with advancements in cryptography. I am looking for a co-author that is familiar with HIP's

[Hipsec] Using cSHAKE for ORCHID

2019-08-22 Thread Robert Moskowitz
I am working on a new set of crypto for HIP.  This is to take advantage of advancements and hopefully make things better in small things. I have been looking at FIPS 202 and NIST 800-185 for the new hash and MACing.  In particular SHAKE and KMAC. Right now, NIST only specifies b=1600 for the

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hierarchical-hit-00.txt

2019-09-12 Thread Robert Moskowitz
-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-hierarchical-hit-00.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft-moskowitz-hip-hierarchical-hit

Re: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hierarchical-hit-00.txt

2019-09-12 Thread Robert Moskowitz
From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-hierarchical-hit-00.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft-moskowitz-hip

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hhit-registries-00.txt

2019-09-13 Thread Robert Moskowitz
Forwarded Message Subject: New Version Notification for draft-moskowitz-hip-hhit-registries-00.txt Date: Fri, 13 Sep 2019 07:13:14 -0700 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz

Re: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hhit-registries-00.txt

2019-09-13 Thread Robert Moskowitz
On 9/13/19 11:48 AM, Jeff Ahrenholz wrote: And the new cipher choice is Keyak.  For now.  How do we get the ESP transform number assigned?  What docs do we need for that? Probably needs a short RFC, similar to this one? https://tools.ietf.org/html/rfc4543 Yes, but no AH.  Perhaps.  I have

Re: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-00.txt

2019-09-16 Thread Robert Moskowitz
I don't have the KEYMAT construction right.  I am talking to NIST about what is needed.  Stay tuned. Close but not quite there. On 9/15/19 7:30 PM, Robert Moskowitz wrote: This completes the first set of drafts for tm-rid. This draft has a couple drafty areas.  Particularly in the cipher, I

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-00.txt

2019-09-15 Thread Robert Moskowitz
Message Subject: New Version Notification for draft-moskowitz-hip-new-crypto-00.txt Date: Sun, 15 Sep 2019 16:12:21 -0700 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-new-crypto-00

[Hipsec] Would HIP benefit by having a PAKE?

2019-08-05 Thread Robert Moskowitz
As part of developing the "Trustworthy Multipurpose Remote ID", I am going to add new crypto algorithms along the lines that I have in draft-moskowitz-small-crypto. The "open' question is that of a PAKE.  Would HIP benefit with a PAKE.  I really don't see it, but since I am opening up the

Re: [Hipsec] hotRFC and side meeting - Trustworthy Multipurpose RemoteID

2019-07-25 Thread Robert Moskowitz
to get enough information before the parties (FAA and ATSM) like real soon.  But there will be time after that if TM-RID is accepted to finish the work properly. On 7/3/19 5:35 PM, Robert Moskowitz wrote: Hello all, I thank all that have been working away on the last few items while I have been

[Hipsec] HIP - TM-RID meeting in Singapore

2019-09-20 Thread Robert Moskowitz
Dear HIPsters, I am in discussion with Ganzalo and Eric about a HIP session in Singapore. The focus is the new work to support "Trustworthy Multipurpose RemoteID" with the target user of UAS. This week I attended the nuair.org UAS Symposium outside of Syracuse NY and received considerable

Re: [Hipsec] Fwd: Last Call comments on draft-ietf-hip-dex-11

2019-11-03 Thread Robert Moskowitz
Right now I will only reply to the AEAD comment. I believe this is directed to the HIP_CIPHER parameter and its use in a number of HIP parameter objects.  The ECHO may be encrypted with it and in DEX we add the PSK. Since all HIP packets that contain these fields are MACed with HIP_MAC, it

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-03.txt

2019-12-13 Thread Robert Moskowitz
-0800 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-new-crypto-03.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft-moskowitz-hip-new

[Hipsec] Fwd: New Version Notification for draft-moskowitz-orchid-cshake-00.txt

2019-12-11 Thread Robert Moskowitz
Dec 2019 14:07:16 -0800 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-orchid-cshake-00.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hierarchical-hit-03.txt

2019-12-16 Thread Robert Moskowitz
-moskowitz-hip-hierarchical-hit-03.txt Date: Mon, 16 Dec 2019 11:22:00 -0800 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-hierarchical-hit-03.txt has been successfully submitted by Robert

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hierarchical-hit-02.txt

2019-10-18 Thread Robert Moskowitz
, Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-hierarchical-hit-02.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft-moskowitz-hip-hierarchical-hit Revision: 02 Title: Hierarchical HITs for HIPv2 Document date

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-hhit-registries-01.txt

2019-10-18 Thread Robert Moskowitz
Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-hhit-registries-01.txt has been successfully submitted by Robert Moskowitz and posted to the IETF repository. Name: draft-moskowitz-hip-hhit-registries Revision: 01 Title: Hierarchical HIT Registries Document date: 2019-10-17

Re: [Hipsec] Finalizing the TM-RID BoF at IETF-106/Singapore

2019-10-24 Thread Robert Moskowitz
Eric, I will update the agenda.  Work in Progress with also reving Dex draft. Michael Richardson is triple booked on this time slot, so maybe Carsten or Henk.  Or Daniel Migault. I will ask around. I posted a message here on the basics of why HIP (it starts with the HIT).  Stu is working

[Hipsec] Fwd: New Version Notification for draft-wiethuechter-tmrid-auth-00.txt

2019-10-18 Thread Robert Moskowitz
...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-wiethuechter-tmrid-auth-00.txt has been successfully submitted by Adam Wiethuechter and posted to the IETF repository. Name: draft-wiethuechter-tmrid-auth Revision: 00 Title: TM-RID

[Hipsec] Updated TMRID BOF Charter

2019-10-25 Thread Robert Moskowitz
I have updated the TMRID BOF Charter at: https://trac.tools.ietf.org/bof/trac/wiki/WikiStart Here it is.  Comments/corrections/additions welcomed: Governmental agencies worldwide, including the United States Federal Aviation Administration (FAA), are embarking on rule making processes to

[Hipsec] TM-RID BOF Schedule

2019-10-22 Thread Robert Moskowitz
The BOF is Tuesday: 1330-1500  Afternoon Session I VIP A       INT     tmrid       Trustworthy Multipurpose Remote ID BOF Hullet      IRTF    gaia        Global Access to the Internet for All Padang      IRTF    maprg       Measurement and Analysis for

[Hipsec] TM-RID progress

2019-11-18 Thread Robert Moskowitz
Fellow HIPsters: The TM-RID BOF went well.  The opinion is to charter TM-RID as a new workgroup.  It will be doing a number of addendum to HIP. Please join the tm-...@ietf.org list to participate. Bob ___ Hipsec mailing list Hipsec@ietf.org

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-01.txt

2019-09-25 Thread Robert Moskowitz
Keyak. Forwarded Message Subject: New Version Notification for draft-moskowitz-hip-new-crypto-01.txt Date: Wed, 25 Sep 2019 14:35:36 -0700 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D

[Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-02.txt

2019-10-03 Thread Robert Moskowitz
.txt Date: Thu, 03 Oct 2019 08:23:18 -0700 From: internet-dra...@ietf.org To: Stuart Card , Adam Wiethuechter , Robert Moskowitz , Stuart W. Card A new version of I-D, draft-moskowitz-hip-new-crypto-02.txt has been successfully submitted by Robert Moskowitz and posted to the IETF

Re: [Hipsec] HIP - TM-RID meeting in Singapore

2019-10-03 Thread Robert Moskowitz
IESG will be looking for activity here to gauge the interest/activity. Bob On 9/20/19 4:45 PM, Robert Moskowitz wrote: Dear HIPsters, I am in discussion with Ganzalo and Eric about a HIP session in Singapore. The focus is the new work to support "Trustworthy Multipurpose RemoteID" with t

Re: [Hipsec] Fwd: New Version Notification for draft-ietf-hip-dex-12.txt

2020-02-13 Thread Robert Moskowitz
On 2/12/20 11:48 AM, Jeff Ahrenholz wrote: I believe this version answers all the IESG issues. Please review, there are some important additions. EKR had a number of security concerns.  Some I feel don't apply to HIP, like use an AEAD for HIP packet security. But there are a number of

Re: [Hipsec] Fwd: New Version Notification for draft-ietf-hip-dex-12.txt

2020-02-13 Thread Robert Moskowitz
On 2/12/20 12:20 PM, Jeff Ahrenholz wrote: I believe this version answers all the IESG issues. Please review, there are some important additions. EKR had a number of security concerns. Some I feel don't apply to HIP, like use an AEAD for HIP packet security. But there are a number of

Re: [Hipsec] Fwd: New Version Notification for draft-ietf-hip-dex-12.txt

2020-02-12 Thread Robert Moskowitz
On 2/12/20 12:20 PM, Jeff Ahrenholz wrote: I believe this version answers all the IESG issues. Please review, there are some important additions. EKR had a number of security concerns. Some I feel don't apply to HIP, like use an AEAD for HIP packet security. But there are a number of

[Hipsec] Something wrong in -12 Re: Fwd: New Version Notification for draft-ietf-hip-dex-12.txt

2020-02-12 Thread Robert Moskowitz
On 2/12/20 12:50 PM, Jeff Ahrenholz wrote: Looking at Section 6.3 HIP DEX KEYMAT Generation, it discusses using Diffie-Hellman derived key Kij, but I don't see anything about using I_NONCE. There is a random #I provided by the Responder from the PUZZLE parameter, but nothing about a random

Re: [Hipsec] Suresh Krishnan's Discuss on draft-ietf-hip-dex-13: (with DISCUSS)

2020-03-04 Thread Robert Moskowitz
On 3/4/20 10:53 AM, Jeff Ahrenholz wrote: https://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xhtml#icmpv6-parameters-codes-5 And nothing there that looks right. So what is done in HIP BEX implementations?  Both v1 and v2? For our HIPv1 implementation: IPv4 packets - we

Re: [Hipsec] Suresh Krishnan's Discuss on draft-ietf-hip-dex-13: (with DISCUSS)

2020-03-04 Thread Robert Moskowitz
to be sent need a Code field to be set in addition to the Pointer. What Code should be used in this message? Please specify this. -- Standard Robert Moskowitz Owner HTT Consulting C:248-219-2059 F:248-968-2824 E:r...@labs.htt-consult.com There's no limit to what can be accomplished if it does

Re: [Hipsec] Benjamin Kaduk's Discuss on draft-ietf-hip-dex-13: (with DISCUSS and COMMENT)

2020-03-04 Thread Robert Moskowitz
strained (DoSing) attacker is competing with a constrained honest initiator to solve puzzles during an attack, it seems like the honest initiator is going to lose out pretty badly. Section 4.1.4 There are security considerations for serializing the HIP state to nonvolatile storage! -- Standard Robert M

Re: [Hipsec] Suresh Krishnan's Discuss on draft-ietf-hip-dex-13: (with DISCUSS)

2020-03-05 Thread Robert Moskowitz
Here is the text I put together for revising sec 5.4 (see below). On 3/3/20 11:47 PM, Suresh Krishnan via Datatracker wrote: Suresh Krishnan has entered the following ballot position for draft-ietf-hip-dex-13: Discuss When responding, please keep the subject line intact and reply to all email

Re: [Hipsec] Roman Danyliw's Discuss on draft-ietf-hip-dex-13: (with DISCUSS and COMMENT)

2020-03-06 Thread Robert Moskowitz
On 3/4/20 1:28 PM, Roman Danyliw via Datatracker wrote: Roman Danyliw has entered the following ballot position for draft-ietf-hip-dex-13: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this

Re: [Hipsec] [Tm-rid] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-04.txt

2020-01-24 Thread Robert Moskowitz
l) steps to complete that work. Yours, Daniel On Thu, Jan 23, 2020 at 10:47 AM Robert Moskowitz mailto:r...@labs.htt-consult.com>> wrote: I have added sec 8.2, discussing the security of using KMAC as a KDF.  This is based on a conversation I had with the Keccak team at the IAC

Re: [Hipsec] Last Call comments on draft-ietf-hip-dex-11

2020-01-29 Thread Robert Moskowitz
to implement it.  I do expect to have something done for a dex-13.txt draft. -Ekr Robert Moskowitz ___ Hipsec mailing list Hipsec@ietf.org https://www.ietf.org/mailman/listinfo/hipsec

Re: [Hipsec] Iotdir last call review of draft-ietf-hip-dex-11

2020-01-27 Thread Robert Moskowitz
I do not see anything in this comment that is directly actionable, but will provide some comments here. On 11/25/19 1:38 AM, Michael Richardson via Datatracker wrote: Reviewer: Michael Richardson Review result: Ready I am the assigned IoT-Directorate reviewer for 1draft-ietf-hip-dex I

Re: [Hipsec] [Tm-rid] Fwd: New Version Notification for draft-moskowitz-hip-new-crypto-04.txt

2020-01-24 Thread Robert Moskowitz
On 1/24/20 1:41 PM, Michael Richardson wrote: Robert Moskowitz wrote: > I would actually like to make a presentation at SAAG about KMAC as a KDF and > why the IETF should incorporate it. > SP 800-185 was published back in Dec 2016.  This clearly shows how to use

[Hipsec] Fwd: New Version Notification for draft-ietf-hip-dex-12.txt

2020-02-10 Thread Robert Moskowitz
Forwarded Message Subject:New Version Notification for draft-ietf-hip-dex-12.txt Date: Sun, 09 Feb 2020 23:11:55 -0800 From: internet-dra...@ietf.org To: Robert Moskowitz , Rene Hummen , Miika Komu A new version of I-D, draft-ietf-hip-dex-12.txt has been successfully

Re: [Hipsec] Fwd: New Version Notification for draft-moskowitz-hip-fast-mobility-03.txt

2020-04-06 Thread Robert Moskowitz
Jeff, Thanks for the feedback.  After Passover, I will incorporate what I pull out of this. Bob On 4/6/20 1:51 PM, Jeff Ahrenholz wrote: Bob, Brief review below... I have updated the hip-fast-mobility draft. I welcome review. It will be used in an upcoming DRIP N-RID secure transport

  1   2   >