[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: about Wedgelayer 3.5 / Fat IP approaches
marcelo bagnulo braun wrote:
Next, I try to replace the current WIMP identifiers with NOID kind of
AIDs
for both end-points; in the next WIMP I-D. The ephemeral context
identifiers together
with hash chains would then be used only to identify the context.
Basically, they would
serve the same purpose as the purpose built-keys for initiators.
That is, epheral context identifiers could be used to prevent
attackers from stealing
a context. (I'm trying to figure out how to bind a specific
application identifier to
a specific context.)
I guess that we should see the details before commenting but in
abstract terms, my concern would be:
Thanks for your valuable comments Marcelo and Erik. We are currently
working on the details,
and I will get back to the issue later in the form of WIMP-01.
...something else. NOID uses the DNS, HIP uses the crypto nature of
its ids, what would be the mechanisms here for this?
That is a very good question, and Erik already gave a short answer to
this. We
just have to figure out what are security implications of this and if
this works,
how it works.
br, Jukka
regards, marcelo