netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: stephen@dino.dnsalias.com (Stephen J. Bevan)
To: Pawel Foremski <pjf@asn.pl>
Cc: netdev@vger.kernel.org
Subject: Re: [RFC] Ethernet Cheap Cryptography
Date: Thu, 19 Oct 2006 19:18:41 -0700	[thread overview]
Message-ID: <17720.12801.843076.819750@localhost.localdomain> (raw)
In-Reply-To: <eh87aq$71t$1@sea.gmane.org>

Pawel Foremski writes:
 > First, ccrypts task is to secure Ethernet, not IP.

Understood, but the vast majority of traffic running over Ethernet
that a user cares about is IP and so IPsec does the job.  Obviously
IPsec cannot handle non-IP traffic but the question is what non-IP
traffic do users want encrypted?


 > Secondly, IPsec won't decrease MSS in TCP encapsulated in PPPoE
 > traffic, for example. 

Various, commercial, IPsec products decrease the MSS for TCP
encapsulated in PPPoE.  I've not checked the Linux 2.6 IPsec code to
see if it does or if it can easily be made to.


 > > b) what traffic other than IP traffic needs to be encrypted.
 > 
 > PPPoE; Ethernet in general.

PPPoE carrying IP can be handled by IPsec as noted above.  That leaves
Ethernet in general.


 > > If the keying is done manually an attacker won't know when the keys
 > > are changed.  However, if keying is coordinated over the same link via
 > > a protocol (as is done with IKE for IPsec) then the attacker can see
 > > (or at least guess) the packets carrying the keying protcol thus know
 > > re-keying is going to occur.
 > 
 > Only if the rekeying traffic is the only being transmitted. IMHO a border
 > case.

Unless you mask the size of your (re-)keying traffic by randomly
padding the packets then they can be detected even in the middle of
other traffic.


 > > Indeed, in IPsec, the equivalent of ccrypt is ESP and that's rather
 > > straighforward.  The complicated part is IKE, the userspace component
 > > that handles keying.  It is certainly possible to create something
 > > simpler than IKE (e.g. IKEv2 is somewhat simpler) but the devil is in
 > > the details.
 > 
 > Sure, but that's IMHO little bit off-topic in regard to ccrypt, which is
 > just an encryption back-end (eventually the rekeying daemon will sit in the
 > userspace).

Sure.  However, there has to be a user<->kernel API and the question
is whether what you have now is sufficient when a daemon is added or
whether it will need to change?  If it does need to change it will
need to be backwards compatible or need to be a separate API?

Also at least for IPsec, the kernel knows something about IKE in that
generally IKE traffic is not encrypted by IPsec.  Instead IKE has its
own encryption which it bootstraps using
shared-secrets/certificates/public&preivate key pairs.  In the case of
ccrypt either the ccryptKE protocol would need to bypass ccrypt or you
need to way to start off with known keys, but not the same keys every
time or that can be exploited.

  reply	other threads:[~2006-10-20  2:19 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-10-15 16:20 [RFC] Ethernet Cheap Cryptography Dawid Ciezarkiewicz
2006-10-15 21:35 ` James Morris
2006-10-15 22:15   ` Dawid Ciezarkiewicz
2006-10-18  3:21 ` Stephen J. Bevan
2006-10-18  3:25   ` David Miller
2006-10-18  9:51     ` Dawid Ciezarkiewicz
2006-10-18 10:16       ` David Miller
2006-10-18 11:35         ` Dawid Ciezarkiewicz
2006-10-18  9:15   ` Dawid Ciezarkiewicz
2006-10-18 14:31     ` Dawid Ciezarkiewicz
2006-10-19  3:57     ` Stephen J. Bevan
2006-10-19 15:58       ` Pawel Foremski
2006-10-20  2:18         ` Stephen J. Bevan [this message]
2006-10-20  2:59           ` David Miller
2006-10-21  2:17             ` Stephen J. Bevan
2006-10-21  2:20               ` David Miller
2006-10-20 20:18           ` Pawel Foremski
2006-10-21  1:58             ` Stephen J. Bevan
2006-10-21  2:28               ` Stephen Hemminger
2006-10-21 15:33                 ` Pawel Foremski
2006-10-21 15:12               ` Pawel Foremski
2006-10-22  0:05                 ` Stephen J. Bevan
2006-10-20 19:50       ` Dawid Ciezarkiewicz

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=17720.12801.843076.819750@localhost.localdomain \
    --to=stephen@dino.dnsalias.com \
    --cc=netdev@vger.kernel.org \
    --cc=pjf@asn.pl \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).