[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: New multi6 draft: WIMP
Dave,
Although the paradigmatic differences probably affect one's list of
issues or "modules", my own view is:
As we apparently share the same paradigm, your list looks
good to me. Some further thoughts:
- Association establishment
An interesting aspect here is the idea of a "staged"
association establishment. That is, maybe you could initially
just exchange a couple of identifiers and/or hash anchors and
check the reachability of the primary address as a side effect.
All further checks, i.e. reachability of other addresses,
establishing strong identity via public key crypto, etc,
could be "delayed" and performed only if needed.
- Endpoint-pair context identification
To me, it looks like that we have to look at this on two or
perhaps three levels. One is how to identify the context
initially, before the end-points have exchanged any messages.
The second one is the way the context is identified in the
control protocol, and the third one how the context is
identified in the actual payload packets. Apparently, some
of these may overlap, depending on the details.
- Authentication of the control exchange
Here the minimal requirements seem to be covered by
Erik's draft (I know that some WG members disagree, but
that is at least party due to different paradigm, IMHO.)
However, especially if the "staged" association establishment
idea is used, it may be possible to introduce more secure
("strong" or "semi-strong" instead of "weak") authentication
on demand.
- Updates to the pool of locators for the context
- Rendezvous (for mobile targets)
I think that we have to make a distinction between initial
rendezvous, or finding a mobile target before there is any
association, and rendezvous while there is an active
association.
And then we have the "third party rendezvous", which I
would like to call referral. That is, handing over an
identifier (IP address or other) to a third host, so that
it can create an association with the identified end-point.
- Control exchange transport
By way of example, MAST has a very large hand-wave with respect to the
details of control exchange authentication. ...
HIP, on the other hand, has very well defined control exchange
authentication, but many people consider it too heavy. The
"staged" idea might be able to help there. It looks like that
HIP is weakest in its handling of the address pool and in some
aspects of rendezvous.
--Pekka