[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
Hi Francis,
El 21/07/2006, a las 17:54, Francis Dupont escribió:
In your previous mail you wrote:
yes but the pki for issuing client certificates that bind IP
addresses
with public keys may be significatly different from the one
available
for TLS server certificates.
=> one real world difference is for public TLS servers one is ready to
pay...
In particular, the type of verification
that is needed is different since in one case you must verify that
the
fqdn contained in the certificate actually belongs to the server,
=> in fact this is not a TLS property but something asks by the
application
(perhaps through an abstract "secure connection setup").
i think there is a misunderstanding here... by verification i am not
talking about the protocol to perform the verification, but the actual
process carried on by the Registration authority to verify that the one
that is requesting the certificate actually owns the ip address that it
wants to include in the certificate. It is not the protocol perspective
that i am refering to but the logistic perspective. What is the
administrative procedure to perform such verification. My point is that
you need to build a different administrative setup to verify the
information included in this type of certificates...
while
in the other case you need to verify that the particular IP address
belongs to a given person, which imho may be harder (since today
addresses are not assigned as a unit but prefixes are allocated to
lirs
and lirs assign prefixes to end sites and then end sites assign
addresses to hosts, so the verification of the trust chain may be
harder imho
=> if you want to stick the prefix delegation with the trust chain
I suggest the RFC 3779 (I can share some code implementing it I did
for a SEND prototype) but it works only for static assignments and
perhaps does not well suit to this particular problem (a reverse
DNSSEC seems better, RFC 3779 was designed for routing protocols).
again, i am not talking about certificate formats but the actual
administrative provedure and agreements that need to be in place to
issue this type of certificates and that they are needed to validate
the information included in them
makes sense now?
regards, marcelo
Regards
Francis.Dupont@point6.net