On Tue, Aug 4, 2015 at 4:21 PM, Ted Lemon <ted.le...@nominum.com> wrote: > On Aug 4, 2015, at 3:01 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote: >> +1 to Donald's response, and -1 to Ted Lemon calling cookies a "kludge". > > Sigh. The actual proposal, particularly the key rollover bit, is quite > elegant, if a bit underspecified, so you’re right to call me out for this > choice of terminology. I called it a kludge because it is an attempt to > use something that makes sense in one context in a different context where > it won’t work very well. It makes sense with IKE because you are > preventing key spamming attacks from consuming massive amounts of CPU. It > wouldn't make sense to use in combination with TSIG because TSIG doesn’t use > public keys.
It all depends on what algorithms you are using, how fast your processor is, how close to saturation your processor is in processing the request stream it is getting, whether it has hardware assist for your algorithm, etc. I agree that there would typically be more benefit for IKE than for TSIG. From that it does not follow that it "wouldn't make sense" to use COOKIEs in connection with TSIG. The non-cryptographic calculations you do for COOKIE verification are going to be at least two orders of magnitude cheaper than the cryptographic calculations you do for TSIG verification. > In the particular use case that has been proposed, > it is > pure speculation that it would actually deliver any benefit at all, but it’s I would say it is more like it is easy to construct situations in which it of great benefit and easy to construct situations in which it is of no benefit. But it is not certain as to where on this spectrum things will typically fall and how that will change with time. > pretty easy to enumerate the costs: twice as many packets sent to clients > that don’t implement it, which will be most clients, and a number Since there is no change in behavior for clients that don't support COOKIEs, there is no increase in packets for them. > approaching twice as a limit as many packets for clients that _do_ support > it, depending on how many of them are repeat customers. I don't see any increase in packets for clients that support COOKIEs. If a server does not think it is under attack and is getting few enough requests from a client (and it seems to me that the first request if it has no previous history of requests would always qualify), it just processes the request normally and includes a server COOKIE with the response. If, on the other hand, a server was going to discard a request from a client then, in the case where the client supports COOKIEs but did not include a correct server COOKIE, the server can return a short BADCOOKIE response, which means the client will be authenticated on its next try so that that client won't send a series of retries that are discarded saving on traffic. Thanks, Donald ============================= Donald E. Eastlake 3rd +1-508-333-2270 (cell) 155 Beaver Street, Milford, MA 01757 USA d3e...@gmail.com _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop