[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: how mobile do we want to be



Hi Jari,

Jari Arkko wrote:
> Iljitsch,
> 
> 
>>Please don't forget: adding a new address in the middle of a session 
>>is a security nightmare. The only way this can be done reasonably is 
>>with the help of strong crypto (magic PKI dust) or a home agent that 
>>is impervious to
>>
> 
> I'm getting a bit frustrated on this thread. I sympathize on the need
> to have a constrained problem to work on. But obviously we are in any
> case using strong crypto, or would you not call HBAs strong crypto? And as
> I have explained in a previous e-mail, PKI means infrastructure
> and we have a number of known techniques (some even implemented
> by several teams) that can do mobility with public keys, but without
> any need for infrastructure.

FWIW, I agree with this, and I also support the charter proposal you
posted earlier.

Furthermore, I think that, because a negotiation would be needed anyway
to detect if the remote end is shim-enabled, this negotiation is an
opportunity to negotiate between CGA/public key crypto/"mobile
multihoming" and HBA/hash functions/"static multihoming".

Hence, all shim-enabled nodes would be required to implement the later
(which is suitable to constrained devices) without preventing stronger
nodes to implement the former if they benefits from it. In case a
constrained device communicates with an unconstrained one, both would
only benefit from the HBA-based readressing, which is still better than
nothing.

Thanks,

--julien