[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New multi6 draft: WIMP
Iljitsch van Beijnum wrote:
Ok. This is basically a secure negotiation mechanism. All other
aspects of multihoming are only addressed fleetingly, if at all.
Hi Iljitsch,
The same phrase applies to several multi-homing I-Ds conversely. "Ok.
This is a
multi-homing mechanism. All aspects of security are only addresses
fleetingly,
if at all" :-)
The main purpose of the WIMP is to present a way to protect hosts from
re-direction
attacks. I don't believe that using IKE nor IPSec are the best ways to
solve the
re-direction problem. WIMP offers a weak, but sufficient security model
for multi-homing.
We are willing to combine the presented WIMP exchange with other multi6
ideas. Multi-homing architecture is a puzzle. Our purpose is to bring a
couple
of new pieces to the puzzle that might complete the final solution. I
believe
that the final solution contains features of several proposals.
When a host wants to negotiate new addresses, some info is split into
n pieces and sent to n addresses. What happens if less than the full
set of n addresses is reachable?
WIMP works fine also in that case.
Let's say that the responder receives a set of new IP addresses, IP1,
IP2, and IP3.
It sends a challenge to each of them. However, IP2 is not reachable. The
initiator
reveices only messages with IP1 and IP3. It constructs a combined key
using the
received key pieces in the challenge messages and sends a response to
the responder.
The responder finds out which of the challenge messages the initiator
received,
using the key mask. The responder is able to verify the answer to the
challenge
using the combined key.
That part of the draft requires clarification. Thanks!
-- Jukka