Hi Elliot,
It sounds like Brian started pretty darn close to where I would be:
> My assumption is certainly that we can trust the first address pair,
> to exactly the extent that we can trust it in a non-multihomed case.
> Is that a wrong assumption?
I think a good solution in this space would not weaken the authenticity
of any existing identifiers.
I guess that i don't understand Brian statement, then.
I mean, suppose that you have host A that uses IPA to initiate a
communication with host B sending packets to IPB.
So, Host B receives packets coming from IPA and it sends replies to IPA.
So far so good, Host B doesn't have a strong confirmation that IPA is really
the genuine identifier of HostA, but Host B knows that Host A can receive
packets addressed to IPA. That is they way it works for fixed hosts and that
is the level of security we should preserve i guess.
Now the problem how do we translate this requirement to a multihomed
environment.
Suppose the same scenario where HostA initiates a communication with HostB
using IPA and IPB respectively. They exchange some packets, so Host B knows
that Host A is reachable at IPA.
Moreover, HostB is using as a ULP identifier IPA.
Now, using some kind of multihoming mechanism, Host A tells HostB that he is
also reachable at IPC. Moreover, Host A can strongly prove that he is the
same that initiated the communication using IPA (i.e. that the same entity
who was at IPA is also at IPC)
Finally, HostA start using IPC as source address in its packets, so HostB
starts preferring IPC over IPA to use as destination address to reach HostA
(instead of changing the IP address an alternative signaling mechanisms can
be used to switch addresses)
So my question now is: do you think that HostB, once that is sending packets
only to IPC and knowing that it is same entity that initiated the
communication using IPA, should still believe that he is communicating with
IPA?
Regards, marcelo
And this is why I liked NOID. You want
strong security? The claim is that it will work with DNSSEC for
verification.
Beyond that, if you have an existing line of communication between you
and a host, wouldn't PBKs provide a secure means by which one could
privately pass additional information? If it does, it provides some
really nice generality for the above. For instance, if you use some
very secure mechanism to establish connectivity then PBKs could provide
continued assurance. And if you were out in the open, PBKs provide less
assurance (e.g., you still end up with potential MITM attacks).
Regards,
Eliot