[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Identifiers



On 29-mrt-04, at 21:14, Erik Nordmark wrote:

If a separate identifier is used this means that the initial setup must
appear before (or at the same time) as the first ULP packets are exchanged.

Yes. This also means the negotiation protocol must be able to get through in order for anything to work, piggybacking will be very hard here.


(Aside: I always thought it was a big flaw in the IKE design that the negotiation is done with the target host. Maybe it's too hard to make this work safely with a third party host, but it would have some nice security benefits and solve rendezvous for mobility.)

But if we just have a locator-agile mechanism without a new identifier space
it makes sense to allow a deferred exchange (and verification) of the locator
sets e.g. to avoid this cost when the connections are very short.

Right.


I don't have a good feeling for how complex it would be to design
a protocol which can do both immediate and deferred setup.

I'd think it wouldn't really matter. Immediate setup can be viewed as deferred after 0 bytes of data have crossed the line. The only difference is that with deferred negotiation some information we need (locators) is by definition available, while with immediate negotiation we may need to go look for it ourselves. Or am I missing something?


Will a scheme which introduces a new ID name space by necessity need
different security mechanisms?

Not by definition. But some types of identifiers could support security mechanisms that others can't. For instance, with crypto based identifiers it is possible to find out whether the other side is the real holder of the identifier with nothing more than information received from the correspondent. With non-crypto IDs you need some chain or web of trust if the identifier is cryptographically protected. Alternatively, the information may not be learned from the correspondent but rather from a mapping service. The way such a mapping service works depends on the nature of the identifiers (hierarchical or otherwise).


So basically we have four permutations of identifiers:

- non-crypto, non-hierarchical
- crypto, non-hierarchical
- non-crypto, hierarchical
- crypto, hierarchical

We probably don't need four different security mechanisms, but more than one is likely if we're going to use identifiers from more than one category.

Will be immediate vs. deferred state setup have implications on this?

I don't see how we can defer state setup for identifiers that aren't reachable locators. And identifiers that ARE locators aren't always reachable, placing part of the multihoming burden on applications.


Is there a common "message sequence" which can apply independently of
the actual security mechanism being used?

Does it matter? The messages are presumably passed back and forth transparently. The only important part is that we have some well-defined state transitions, and the security mechanism triggers the right one at the right time.


BTW, without knowing the details, I think 802.1x, PPP and EAP solve a fairly similar problem.

Iljitsch