Skip to main content

Key Change Strategies for TCP-MD5
draft-bellovin-keyroll2385-04

Revision differences

Document history

Date Rev. By Action
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Jari Arkko
2007-01-11
04 (System) IANA Action state changed to No IC
2007-01-10
04 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-01-09
04 Amy Vezza IESG state changed to Approved-announcement sent
2007-01-09
04 Amy Vezza IESG has approved the document
2007-01-09
04 Amy Vezza Closed "Approve" ballot
2007-01-08
04 Russ Housley State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Russ Housley
2007-01-08
04 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-01-08
04 (System) New version available: draft-bellovin-keyroll2385-04.txt
2007-01-08
04 Jari Arkko [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss by Jari Arkko
2006-12-27
04 Jari Arkko
[Ballot discuss]
> There is a problem if the unchanged machine is a "silent host" -- a
> host that has nothing to say, and …
[Ballot discuss]
> There is a problem if the unchanged machine is a "silent host" -- a
> host that has nothing to say, and hence does not transmit.  The best
> way to avoid this is for an upgraded machine to try a variety of keys
> in event of repeated unacknowledged packets, as discussed earlier.

I re-read the relevant parts of the draft and was
considering removing my Discuss entirely, since the
text in Section 2.2 covers most of what I wanted to
say. But I would still suggest changing the

  The best way to avoid this is for an upgraded machine
  to try a variety of keys in event of repeated unacknowledged
  packets, as discussed earlier.

to

  The best way to avoid this is for an upgraded machine
  to try a variety of keys in event of repeated unacknowledged
  packets, and to probe for new unused keys under silent
  periods, as discussed in Section 2.2.
2006-11-17
04 Samuel Weiler Request for Telechat review by SECDIR Completed. Reviewer: Love Astrand.
2006-11-17
04 (System) Removed from agenda for telechat - 2006-11-16
2006-11-16
04 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2006-11-16
04 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-11-16
04 Ross Callon
[Ballot comment]
A minor point: First paragraph of section 2.1:

  A receiver has a list of valid keys.  Each key has a (conceptual)
  …
[Ballot comment]
A minor point: First paragraph of section 2.1:

  A receiver has a list of valid keys.  Each key has a (conceptual)
  timestamp associated with it.  When a segment arrives, each key is
  tried in turn.  The segment is discarded if and only if it cannot be
  validated by any key in the list.

In my reading of the document, the timestamp doesn't actually do anything wrt receiving the packet, but does have an effect on sending the packet, in that the timestamp is the earliest time that you will use the key in sending a packet, but you will use any of the configured keys in checking received packets. I think that this could be stated a bit more explicitly up front, and it seems odd that if the timestamp is only used for sending, it is described in the receiving section. One option would be to move this section ahead of the 2.1 heading, so that it becomes part of section 2, and then update it to clearly make this point. This might then make the beginning of section 2 (up to the 2.1 heading) to read:

  2.  The Algorithm

  A receiver has a list of valid keys that may be used for both
  transmission and reception.  Each key has a (conceptual) timestamp
  associated with it which specifies the earliest time that it can
  be used for transmission. 

  Separate algorithms are necessary for transmission and reception.
  Reception is easier; we explain it first.

  2.1.  Reception

  When a segment arrives, each key is tried in turn (without regard
  for the timestamp).  The segment is discarded if and only if it
  cannot be validated by any key in the list.

  In principle,...


A very minor nit: second paragraph of section 2.1, last sentence says:

  On the other hand, validating that a received segment is putatively
  legal, by checking its sequence number against the advertised window,
  can help avoid denial of service attacks.

I think here that the word "avoid" should be "minimize the impact of", since strictly speaking this strategy doesn't completely avoid DOS attacks, it just allows you to discard some invalid packets with a relatively quick method (check sequence number) rather than a slower method (check the authentication).
2006-11-16
04 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-11-16
04 Jari Arkko
[Ballot discuss]
> There is a problem if the unchanged machine is a "silent host" -- a
> host that has nothing to say, and …
[Ballot discuss]
> There is a problem if the unchanged machine is a "silent host" -- a
> host that has nothing to say, and hence does not transmit.  The best
> way to avoid this is for an upgraded machine to try a variety of keys
> in event of repeated unacknowledged packets, as discussed earlier.

The machine cannot be silent, if it is expected to
have a persistent TCP session with its peer, such
as is the case with BGP use of TCP MD5. There will
be ACKs.

Or are you referring to a situation where the two
hosts are not communicating at all, and will bring
up TCP only on a per-need basis? If yes, the draft
probably needs to talk about delaying any key
change actions until there has been communication.
2006-11-16
04 Jari Arkko [Ballot Position Update] New position, Discuss, has been recorded by Jari Arkko
2006-11-16
04 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner
2006-11-15
04 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2006-11-15
04 Brian Carpenter
[Ballot comment]
No IANA considerations. Author suggests:

        There are no IANA actions required.  The TCP-MD5
        option number …
[Ballot comment]
No IANA considerations. Author suggests:

        There are no IANA actions required.  The TCP-MD5
        option number is defined in [RFC2385], and is currently
        listed by IANA.
2006-11-15
04 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-11-15
04 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded by Magnus Westerlund
2006-11-14
04 Dan Romascanu
[Ballot comment]
It is not clear to me what the following text in Section 3 means:

'Any monitoring mechanism can be used; most likely, it …
[Ballot comment]
It is not clear to me what the following text in Section 3 means:

'Any monitoring mechanism can be used; most likely, it will be a combination of a MIB entry and a command-line display.'

I assume that by MIB entry the author means a MIB object or entry in a table in a standard MIB module. What command-line has to do here? Or does he mean that the current practice or recommendation for monitoring involves some mix of management interfaces out of which MIB objects accessed by SNMP and CLI are more obvious?

It would be good to clarify this part of the text.
2006-11-14
04 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-11-14
04 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2006-11-13
04 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie
2006-11-08
04 (System) Request for Telechat review by SECDIR is assigned to Love Astrand
2006-11-08
04 (System) Request for Telechat review by SECDIR is assigned to Love Astrand
2006-10-27
04 Russ Housley Placed on agenda for telechat - 2006-11-16 by Russ Housley
2006-10-27
04 Russ Housley State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Russ Housley
2006-10-27
04 Russ Housley [Ballot Position Update] New position, Yes, has been recorded for Russ Housley
2006-10-27
04 Russ Housley Ballot has been issued by Russ Housley
2006-10-27
04 Russ Housley Created "Approve" ballot
2006-10-26
04 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2006-10-03
04 Yoshiko Fong IANA Last call Comment:

NO IANA Considerations Section.
We understand this document to have no IANA Actions.
2006-09-28
04 Amy Vezza Last call sent
2006-09-28
04 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-09-28
04 Russ Housley State Changes to Last Call Requested from AD Evaluation by Russ Housley
2006-09-28
04 Russ Housley Last Call was requested by Russ Housley
2006-09-28
04 (System) Ballot writeup text was added
2006-09-28
04 (System) Last call text was added
2006-09-28
04 (System) Ballot approval text was added
2006-09-28
03 (System) New version available: draft-bellovin-keyroll2385-03.txt
2006-09-26
04 Russ Housley State Changes to AD Evaluation from Publication Requested by Russ Housley
2006-09-26
04 Russ Housley Draft Added by Russ Housley in state Publication Requested
2006-09-25
02 (System) New version available: draft-bellovin-keyroll2385-02.txt
2006-07-17
01 (System) New version available: draft-bellovin-keyroll2385-01.txt
2006-06-26
00 (System) New version available: draft-bellovin-keyroll2385-00.txt