[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: New multi6 draft: WIMP



>> We have submitted a new multi6 draft to I-D directory. The draft 
>> defines a Weak Identifier Multihoming Protocol (WIMP), and 
>we wrote it 
>> in order to see how opportunistic/weak authentication 
>methods could be 
>> used to sove the multi6 problem.
>
>Ok. This is basically a secure negotiation mechanism.

This is basically a _weak_ secure negotiation mechanism. It would 
be better if the authors state explicitly the environments it will
be used. If I am running an enterprise internet service which is 
site-MHed for reliability, I won't prefer HIP or WIMP or PBK for 
secure negotiation. They are useful but only for certain limited 
scenarios. 

while HIP depends on a trusted model like DNSSEC, why it does extra 
work (crypto puzzles) to avoid third party infrastructure? what is 
the incentive to use such schemes? Although, crypto puzzles work 
against intruders, are we not penalizing a legitimate user by asking
him to waste his CPU cycle?

btw, is their any standardized RFC supporting weak authentication 
methods? RFC 1984 states explicitly that IETF won't knowingly make
the protocol weaker. But, it was wrote for a different purpose. 
anyway, I wish that authors of HIP/WIMP explicitly state the 
environment in which weak authentication is ok.