[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006
Resent for Francis Dupont, as his pointing was bounced by the him6
list manager (non-member submission
======================
In your previous mail you wrote:
> Here we are in trouble because the main threat is hard: the best known
> defense, mutual strong authentication, is not deployable. So we get
> poor mechanisms (like RR) and we try to improve them (like CBA) against
> secondary threats when the main one still remains... I really like
> to see shim far better than mip!
>
but do you think that the security resulting with HBAs and the
additional mechanisms available in shim are good enough?
=> HBAs are weaker than CGAs (which provide ownership using the signature),
and than standard strong authentication (using some kind of PKI).
Without the hash extension IMHO they would be too weak, now we have
to take advice from cryptographers to understand if/how to improve them...
Regards
Francis.Dupont@point6.net
PS: BTW my employer when I implemented HBAs was "GET/ENST Bretagne".