On Feb 13, 2012, at 4:06 PM, Ben Campbell wrote:
Do I infer correctly from your comment that the security properties of the
mechanism don't really matter? That is, if the attacker we care about can't
eavesdrop in the first place, does this really need to be an HMAC?
Hm, I thought about that a bit more after I wrote my response. The HMAC
allows us to avoid sending the nonce in the clear in the DHCPFORCERENEW. I
don't think this adds any value from a security perspective, actually, even
though it feels more comfortable. I suspect it was put in in the original
version simply because of that—why send a secret over the wire when you don't
have to? However, the original motivation for using the mechanism from
RFC3315 was to avoid defining a new mechanism for a legacy protocol. If we do
need to change it, it's going to require a major rework of the document, and a
lot of delay, so if it causes no harm, I think that's not worth doing.
I too would like to see the text I proposed added to the security
considerations, so that we can be clear about what is being accomplished with
this draft.
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf