The question now is how do you provide security for this negotiation of
alternative addresses in this first stage?
Since we have return routability there is no need to prove ownership of
the first IP address.
Return routability procedure has an inherent problem when it is applied to
the multihoming scenario. the problem is that in multihoming, at a given
moment, the address is no longer reachable, so it is difficult to
distinguish an outage from and attack.
Please, note that when using RR it is not enough to verify the initial
address only at the beginning, you need to verify it periodically, if not,
you are susceptible to time shifted attacks
I think this makes sense because if you don't bother to use IPsec or TLS for a session, then the communication is subject to all kinds of nastiness from a man in the middle anyway, so protecting against session stealing isn't worth the trouble.
This is where i don't agree. I think we shouldn't do things worse than what
they already are (or at least not too much worse)
1. Without a new namespace we can make sessions compatible with existing TCP as long as no rehoming events are necessary
Well, i guess that if the other end is upgraded it doesn't matter, and if it
is not, the only option is to fall back to regular IP and not use the new
ids.
2. Introducing a new namespace would take much more time
Why? I guess that if the id is managed, perhaps, but there are other options
3. We don't know yet what kind of namespace we want, or even how many, so we probably need to keep our options open for adding even more anyway
Well, as is said, IMHO this is the problem that we should solve, and we should make a decision on this.