On 10/22/2013 06:51 AM, Ted Lemon wrote:
On Oct 22, 2013, at 8:40 AM, Daniel Migault <[email protected]> wrote:
By trusted relationship, I wanted to clarify that authenticating the DHCP 
Server is not sufficient. The Client MUST trust the DHCP Server. More 
specifically, when you are in a corporate network you assume you are in a 
trusted network, so you trust information from your DHCP Server. On the 
contrary, in a cyber café, even if you authenticate the DHCP Server as the one 
of the cybercafé, you do not necessarily trust it to the point to accept 
crucial information.
But this is absolutely crucial.   How do you know that you are on a trusted 
network?   The document doesn't say.   DHCP is supposed to be zero-touch.   If 
we have to set up a DHCP security association in order to be able to trust the 
DHCP server to tell us what the DNSSEC trust anchors are, why not skip that 
step and install the trust anchors?


Since this is homenet, oughtn't we be thinking in terms of getting configuration information from things that we believe we ought to always trust, like, oh say, a server on our home network?
Regardless of our current attachment point(s)?

There's always been a friction between the discovery function of dhcp and the configuration function. Today's roaming -- and the complete inability for us to know what we're attached to
at any given time -- brings that into stark relief.

Mike
_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to