[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: CGA Use with HBA in Shim6 IETF Meeting July 10, 2006



Hi Marcelo,

Sorry for the late response, but by answering this email, I would
like to address my opinion on the security mechanism of the SHIM6
protocol.  please find my comments below.

On Wed, 19 Jul 2006 22:39:18 +0300
marcelo bagnulo braun <marcelo@it.uc3m.es> wrote:

> 
> El 19/07/2006, a las 22:28, Bound, Jim escribió:
> 
> > You and I are disagreeing on where the market is going to go 
> > technically.  I don't think we will compromise or that we can 
> > converge.  So trying to save a lot of email here.
> >
> > What we need the working group to discuss now is how much and when do 
> > we worry about the market doing our engineering/scientist work to 
> > identify a protocol.
> 
> exactly
> 
> i think we (you and me) send enough emails about this point, the point 
> is whether the wg thinks that basing the shim6 security in widespread 
> availability of certificates issued by a global PKI is acceptable or 
> not
> 
> comments form the wg?

The choice of IPsec is not realistic, I think. Because, SHIM6 protocol
is expected to run among anonymous nodes.  That is, we cannot assume
any soft of pre-shared secret.  If the peers try to authenticate with
public key, then we must rely on global PKI.  I agree with your statement
that the assumption (wide deployment of PKI) is difficult.

So, I support the current security mechanisms (HBA, CGA, HBA/CGA) specified
in the SHIM6 base protocol which do not require any infrastructure.
I think its more scalable and easy to deploy.


Regards,
Shinta

(rest of the original email snipped)