On Aug 1, 2011, at 1:19 PM, Joe Touch wrote:



On 8/1/2011 10:25 AM, David A. McGrew wrote:
...
But we lose all
TCP header MACing - e.g., someone can RST our connection. TCP AO
suggests that MACing TCP headers is important so crypto protocols should
do that (hence why we live in the transport layer).

True, but why not design tcpcrypt so that it make use of TCP-AO? That
seems like an approach that would work with the separation outlined above.

TCP-AO could easily support a mode where the TCP body was encrypted, e.g., where the encryption algorithm were defined to use the connection context (TCP header, IP pseudoheader) as context.

It occurs to me that one of the downsides of having authentication via TCP-AO and encryption via TCPcrypt would be that authenticated encryption (AEAD) could not be used.


I had been planning on working that into the experimental TCP-AO NAT doc, since it could be as useful as the NAT variant.

That won't help initialize the keys, as would be needed before the SYN arrives for TCP-AO. That sort of in-band keying was excluded from TCP-AO to keep the SYN header size down.


Can TCP-AO possibly be used in a situation where the key is established after the initial message exchange, but there is no key available to both endpoints in the first exchange? If so, is there a strong security requirement that militates against doing that? It would be undesirable to have an endpoint set up a session (without authentication) then immediately have to tear it down (because when authentication was turned on, it became apparent that an active attacker had created or modified the messages). But perhaps if the "damage" is well contained and quickly discovered, it would be OK?

David

Joe

_______________________________________________
saag mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/saag

Reply via email to