+1 on the need for a local trust anchor if users want authentication

Without a local trust anchor, how are we ever going to do authenticated reverse resolution of the ULA space? Without a local trust anchor, how would we guarantee stand-alone operations (of DNSSEC)?

+1 on the need for a unique/identifiable name space

<uniqueString>.<well-known-string>. might work. e.g. .<ULA>.homenet.

then indeed you'd have to "enroll" with a homenet to be able to trust it's namespace if you wanted authentication. But at least the namespace would be pretty unique once you did so, even for highly mobile devices. Bootstrapping the namespace wouldn't seem to be a problem, as the ULA prefix can be detected by all devices.

In the unlikely event of two homenets choosing the same ULA, and thus having overlapping namespace as detected by a highly mobile device, I guess there'd have to be some sort of tie-breaker e.g. the trust anchor itself, or the user is warned and manually regenerates a new ULA for one of her homenets. FYI RFC6821 uses ULA as a unique host identifier.

regards,
RayH

Brian E Carpenter wrote:
On 10/07/2012 17:18, Michael Thomas wrote:
...
Third, maybe we do not need more than one secure .local name server
in a network that has more than one router.

Seriously, I can see my neighbor's wifi, and I have access to his
(guest) net. This problem is already here.

.local is a problem in exactly the same way that RFC1918 is a problem.
For homenet, we should really do better (as ULAs do better than RFC1918).

If you want something that walks and talks like a locally defined,
locally significant TLD, then that's exactly what you'd better have.
So it needs to be .<uniqueString>  not .<wellKnownString>

    Brian

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to