[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
IPsec is deployed end-to-end for v4 and v6 in production not sure I
agree no one knows how to do this and I think I misunderstood your
statement below? Thanks.
/jim
> -----Original Message-----
> From: Iljitsch van Beijnum [mailto:iljitsch@muada.com]
> Sent: Tuesday, July 11, 2006 9:09 AM
> To: Pekka Savola
> Cc: Bound, Jim; shim6@psg.com
> Subject: Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
>
> On 11-jul-2006, at 8:01, Pekka Savola wrote:
>
> >> Recommendation: For now remove HBA and the use of ULID security
> >> specifying HBA and leave it as work to be completed that
> avoids this
> >> IPR problem with CGA. Suggestion is to simply embed ULIDs
> within the
> >> data payload with new option and secure all communications
> at least
> >> for now for IP layer communcatiions with IPsec encryption based on
> >> locator pair.
>
> > How could this any-to-any IPsec (no prior relation to your
> peers can
> > be assumed) be made to work?`
>
> > I think this potential solution path was hinted at the security
> > directorate review we got some time ago,
>
> And what would that be?
>
> Let me repeat my suggestion from yesterday in a bit more detail:
>
> In the absense of any information on whether there is even a
> patent claim on HBA itself or only on CGA (is there really no
> way to determine this?) we keep HBA but rather than make it
> the only and mandatory security mechanism (I'm unsure about
> the status for CGA but I'll assume that to be a variation of
> HBA for these purposes), we add an additional security mechanism.
>
> What I'm thinking of here is not IPsec, as nobody has yet
> figured out how to run IPsec between two hosts without any
> prior coordination in the real world, but rather TLS. This
> could be as simple as doing the shim negotiation inside a TCP
> session encrypted with TLS. This means more and larger
> packets, and one end needs to have a certificate that leads
> back to something the other end trusts, so in some ways it's
> inferior to HBA, but TLS is widely implemented so adding this
> should be very simple and then people have a choice between
> HBA IPR issues or TLS PKI and performance issues. Last but
> not least, TLS security would make it a good deal easier to
> implement the shim in a middlebox.
>
> Iljitsch
>