[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CPE equipments and stateful filters
>On Jul 24, 2007, at 10:46 AM, Jun-ichiro itojun Hagino wrote:
>> as far as i understand, UPnP has no authentication whatsoever (if
>> there is, you would face a bootstrap problem for secret sharing).
>> so, once your UPnP-client box gets hijacked, bad guys can open up
>> any TCP/UDP ports in your network. i'd rather have no UPnP on my
>> router. UPnP adds more complexity onto the complexity of NAT/
>> firewall, so what would you expect? :-)
>
>To be honest, I don't know much about UPnP. What you say is
>consistent with what I have heard, and not consistent with what I
>said a few moments ago.
>
>That doesn't make the AAA issue wrong.
let us hear from jhw, who should have done a lot of homework on UPnP
matter.
>> what i've been repeatedly trying to deliver is that, (it is more of
>> IAB stuff) access controls at organization borders and/or based on
>> address has to stop now. if you wish to be sure you are
>> communicating with murai-san you have to check his identity using
>> crypto signature.
>
>I understand that point. I am saying that I disagree with it. For one
>thing, the same key sharing issue applies. Basing identity on address
>is, as you say, whacked; it has to be based on something much more
>relevant. But IMHO, that is about identification and authentication.
>I am saying that authorization, which is something different, is not
>a given and should not be a given. Authorization is something I grant
>to a subset of those I encounter, and only to those that I can
>identify with some appropriate level of strength.
i noticed you have PGP signature to ensure you identity :-)
here i'm mixing up authentication, authorization and identification a
little bit. but in essense, they are all the same in the way that they
are tied with key exchange problems.
key distribution is a tough problem. many people are trying hard,
such as:
- to make authentication optimistic when you try for the first time
(ssh)
- to make keys available worldwide via DNS (opportunitistic IPsec)
- make a hierarchy of "trust" and install root key in applications
(https/X509, DNSSEC)
- use ssh/scp as a bootstrap and copy X509 keys, then exchange session
keys (IKE)
some of them are deployable, some may not.
itojun