[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: about Wedgelayer 3.5 / Fat IP approaches



marcelo bagnulo braun wrote:

Next, I try to replace the current WIMP identifiers with NOID kind of AIDs
for both end-points; in the next WIMP I-D. The ephemeral context identifiers together
with hash chains would then be used only to identify the context. Basically, they would
serve the same purpose as the purpose built-keys for initiators.
That is, epheral context identifiers could be used to prevent attackers from stealing
a context. (I'm trying to figure out how to bind a specific application identifier to
a specific context.)



I guess that we should see the details before commenting but in abstract terms, my concern would be:


Thanks for your valuable comments Marcelo and Erik. We are currently working on the details,
and I will get back to the issue later in the form of WIMP-01.




...something else. NOID uses the DNS, HIP uses the crypto nature of its ids, what would be the mechanisms here for this?

That is a very good question, and Erik already gave a short answer to this. We
just have to figure out what are security implications of this and if this works,
how it works.


br, Jukka


regards, marcelo