[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006



Hi Iljitsch,

El 19/07/2006, a las 15:30, Iljitsch van Beijnum escribió:

On 19-jul-2006, at 11:57, marcelo bagnulo braun wrote:

As i understand it, the only way to make the shim6 security based on IPSec is to assume that a global PKI is deployed, including client certificates (i.e. not only server certificates) so that it is possible to secure any-to-any communication.
From what i understand such global pki is not in place yet and it doesn't looks like it will be anytime soon if ever. So, i really don't think it is reasonable to build the security on the shim6 relying on such global pki deployment
does anybody think that it would be acceptable to build the shim6 security based on the assumption of a global PKI deployment?
Note that server certificates are relatively widespread, hence my 
suggestion to adopt TLS as an alternative security mechanism in 
addition to HBA.

server certificate are more widely used than client certificates indeed, but in the case of the shim6 we need certificates for both ends, so what do we do for securing the client?
besides, currently deployed certificates provide binding between FQDNs 
and public key.... while in the shim6 we need binding between IP 
addresses and public keys, meaning than currently deployed certificates 
are not good (at least not in the general case and additional 
assumptions about the existance of a FQDN is needed and the associated 
implications...)
in addition, using certificates and public key crypto is much more 
expensive than CGAs, since they would involve public key operations not 
only for the validation of the locator set (as in CGA) but also for the 
validation of the certificates themselves (and this costs grows if the 
certification chain is long). In addition, there is the overhead due to 
the transmission of the certificates in the protocol itself, including 
all the certificates in the cert chain, which may even not fit in a 
single packet so we may end up neededing to send multi-packet messages.
and all this for every shimmed communication....

i thought that one of the key goals in the shim6 design was efficiency.... such an approach would really move us apart from the efficiency path...
regards, marcelo


It would be helpful to determine whether we as a wg want this or not.

Obviously it's also possible to use IPsec rather than TLS but I don't see how this would benefit us greatly and IPsec has proven hard to deploy until now.